The Thanksgiving Bandits

Last year, the notorious Thanksgiving Bandits struck for the third time. They stole over 1,000 potatoes that were meant to be mashed for the annual Thanksgiving Day feast. Two years ago, they burgled 400 pounds of cranberries, and they took 104 pumpkin pies the year before that. No one knows how they pull off such masterful heists or what they do with their score, but everyone agrees that they must be stopped at all costs.

Your department has been tasked with intercepting and deciphering their communications to determine when and where they will strike next. You've discovered that they are hiding CANs with secret messages in them inside bags of stuffing, but no one can make any sense of what they say. There are only a few days until the big celebration, and people are becoming worried!

At this point, it's all up to you to determine what the Thanksgiving Bandits are communicating so the authorities can act. Will you save Thanksgiving, or will you allow the bandits to ruin it for the fourth year in a row? People are counting on you.

Download Now


Open Positions

Photo: cyber engineer working at a computer

Hardware Security Engineers

Do you like working with microelectronics?

Design test articles for hardware security research, and design new prototype methods including electrical, optical, and other sensing modalities for assessing physical and architectural security properties of microelectronics and embedded systems.

View Open Positions

Photo; Two Cyber engineers working on a computer

Vulnerability Researchers and Reverse Engineers

Do you like understanding how things work and break?

Discover vulnerabilities and debug programs with tools like gdb or QIRA, create automated, scalable and reverse engineering tools and pipelines. Use and build vulnerability research tools that push past the edge of current tools and techniques. 

View Open Positions

Photo: cyber engineer working on a laptop

Embedded, Software, Systems, and Network Engineers

Do you like assessing and evaluating new technology?

Provide advanced day-to-day systems analysis and support for monitoring, troubleshooting, configuring, reporting, implementing, installing, and upgrading core infrastructure hardware, storage, software and/or server-based applications

View Open Positions

Photo: Women working on a tablet

Program Management and Technical Positions

Do you like understanding delivering critical services to support our clients?

Lead the project team with ultimate responsibility for meeting technical, cost schedule, quality, financial and contractual performance. Conduct research and development, manage laboratories, design and manufacture products. 

View Open Positions



Sign up to receive information on new challenges, job opportunities and cyber research.

Get Cyber Careers Updates