Two Six Technologies
Jobs at Similar Companies
Similar Companies Hiring
Jobs at Two Six Technologies
Search the 38 jobs at Two Six Technologies
Recently posted jobs
The DevOps Engineering Team Lead at Two Six Technologies will manage a team of 5-7 DevOps engineers while participating in hands-on development, strategic discussions, and the maintenance of build tools and processes to support software releases in cybersecurity technology.
As a Data Engineer at Two Six Technologies, you'll analyze complex datasets to inform government operations, leverage software packages, and cloud services to derive insights from large data volumes, and perform statistical analyses for trends. You'll also develop dashboards and recommend solutions to improve data quality.
The System Administrator will support the Corporate Security team by ensuring compliance for classified programs. Responsibilities include installing and configuring Linux and Windows systems, user account administration, troubleshooting, and performing system backups.
The Senior DevOps Engineer at Two Six Technologies will join a cross-functional team to enhance cybersecurity products. Responsibilities include solving problems, mentoring team members, managing CI/CD processes, and ensuring scalable architecture efforts, with a strong emphasis on documentation and collaboration.
The Cloud Engineer will design and build a secure cloud-based enclave, perform Operations and Maintenance tasks, and enhance cloud architecture post-migration. Responsibilities include managing AWS services, ensuring compliance, maintaining Windows environments, and implementing security best practices.
The Principal Vulnerability Researcher will perform advanced reverse engineering and vulnerability analysis on various architectures, aiding in the development of capabilities for national security missions while mentoring junior engineers. The role requires in-depth knowledge of low-level programming, reverse engineering tools, and collaboration to transition findings to production environments.
Develop 2D and 3D RF propagation models using various software applications, ensuring accuracy and documentation for non-experts. Convert RF models into geospatial formats for engineering and operational use.
As a Lead Vulnerability Researcher, you will perform vulnerability research on complex embedded systems, develop tools to automate reverse engineering, provide technical leadership, mentor junior team members, and present findings to clients.
The Lead Research Scientist in Cryptography will participate in research on applied cryptography, assist in evaluating cryptographic software, tackle complex technical problems, and work within a small team to drive innovation while receiving mentorship and training.
The Principal Contracts Administrator at Two Six Technologies oversees the lifecycle of federal contracts, ensuring compliance with regulations, leading negotiations, and coordinating between departments. This role requires extensive knowledge of contract laws and regulations as well as experience managing complex contracts in a dynamic environment.
The Senior Research Engineer at Two Six Technologies will research and develop innovative technologies for mobile communications. Responsibilities include designing and implementing research programs, developing software for mobile platforms, and identifying security risks in applications and systems.
The Research Engineer will design, build, test, and implement research programs targeting resilient communications and next-generation networks. The role involves understanding mobile technology dynamics, identifying security risks, and developing software solutions for mobile and resource-constrained platforms.
The Research Engineer will engage in designing, building, testing, and implementing research programs focused on resilient communications and next-generation networking, while developing custom software solutions for mobile and resource-constrained platforms.
As a Senior Backend Python Developer, you will work on multi-domain platforms focusing on national security by maintaining data migration tools and implementing data model changes. Your responsibilities involve collaborating with stakeholders to meet complex data needs, providing support for existing systems, and guiding team members in technical tasks.
As a Lead AI/ML Engineer, you will design and implement advanced machine learning solutions, mentor team members, and collaborate with multidisciplinary teams to enhance the trustworthiness of AI systems.
The Data Engineer at Two Six Technologies will handle data flows, provide support for ETL processes, troubleshoot complex issues, enhance data pipelines, and guide less-experienced engineers. The role requires expertise in database development and large-scale data manipulation.
The Senior Research Engineer will design and implement high-assurance software systems using Rust, applying formal methods to ensure security and reliability. This role involves leading initiatives for software correctness, collaborating with multidisciplinary teams, and integrating formal verification tools into development processes.
The Senior Software Development Engineer in Test (SDET) will design, write, and maintain automated tests for UX/UI and performance. They will monitor test automation projects, collaborate with cross-functional teams during Agile planning, and provide mentorship for junior developers. A key focus will be to ensure the quality of software releases by transposing manual tests into automated features and managing testing environments.
The Senior Systems Software Engineer at Two Six Technologies will design, develop, and maintain software systems, focusing on graph databases and third-party system integration. The role involves collaborating with cross-functional teams, performing code reviews, troubleshooting, improving performance, and implementing data models.
The Senior Research Engineer - Formal Methods will research and develop high-assurance software and hardware systems using formal analysis technologies. Key responsibilities include proving safety and security properties, evaluating formal methods tools, collaborating with partners, and writing research papers.