Do You Have What It Takes?

Battelle Capture the Flag (CTF) events are fun and challenging computer security competitions. Competitors are expected to “capture flags” to increase their score.

Battelle CTFs vary in their degree of difficulty and require participants to exercise different skillsets to solve them. Once solved, a flag is given to the player and they submit this flag to the CTF server.

Connect with our CTF team at for help getting started with the Capture the Flag or to discuss career opportunities.

Event Details:

Battelle Beginner CTF

Dates Open:
Stay tuned for our next CTF coming in September. 

This competition is intended for beginner level CTF participants. This is a fun introduction for new players, with more challenging problems to come. If you are interested in harder problems or want to know when the next CTF is, sign-up to receive updates from the Battelle cyber team. You'll also be notified of new or current career opportunities.



  • This CTF is intended for individuals. Playing in groups is discouraged.
  • Sharing flags will be considered cheating and will result in immediate disqualification.
  • Attacking the CTF infrastructure is off limits. Any attempts at disrupting service availability for other participants will result in immediate disqualification.
  • Attempting to brute force flags is not acceptable.
  • Automatic Vulnerability Scanners like SQLmap are prohibited.

Helpful CTF Tips and Videos

CTF Solve by Battelle Reverse Engineering Expert: Enter the Delorean CTF from Hackers Teaching Hackers

CTF Solve by Battelle Reverse Engineering Expert: The Smoke Rises CTF from Hackers Teaching Hackers

Open Positions

Photo: cyber engineer working at a computer

Hardware Security Engineers

Do you like working with microelectronics?

Design test articles for hardware security research, and design new prototype methods including electrical, optical, and other sensing modalities for assessing physical and architectural security properties of microelectronics and embedded systems.

View Open Positions

Photo; Two Cyber engineers working on a computer

Vulnerability Researchers and Reverse Engineers

Do you like understanding how things work and break?

Discover vulnerabilities and debug programs with tools like gdb or QIRA, create automated, scalable and reverse engineering tools and pipelines. Use and build vulnerability research tools that push past the edge of current tools and techniques. 

View Open Positions

Photo: cyber engineer working on a laptop

Embedded, Software, Systems, and Network Engineers

Do you like assessing and evaluating new technology?

Provide advanced day-to-day systems analysis and support for monitoring, troubleshooting, configuring, reporting, implementing, installing, and upgrading core infrastructure hardware, storage, software and/or server-based applications

View Open Positions

Photo: Women working on a tablet

Program Management and Technical Positions

Do you like understanding delivering critical services to support our clients?

Lead the project team with ultimate responsibility for meeting technical, cost schedule, quality, financial and contractual performance. Conduct research and development, manage laboratories, design and manufacture products. 

View Open Positions



Sign up to receive information on new challenges, job opportunities and cyber research.

Get Cyber Careers Updates