OVERVIEW Ready to be part of a cutting edge growing Cyber Security project that will make a huge impact on the DOD/Intel community? This exciting program includes performing software engineering, reverse engineering, and vulnerability research with a focus on OCO (Offensive Cyber Operations) and DCO (Defensive Cyber Operations) activities. Support assessments of large-scale weapons systems and other national security operations. We need our developers to be versatile, display leadership qualities and be enthusiastic to tackle new challenges across the full stack as we continue to push security forward.
RESPONSIBILITIES Designs, modifies, develops, writes, and implements and tests software and software applications individually or as a team member Primary role is to lead technical design of software systems as well as lead integration testing of software systems Supports System Administrators with the installation of software applications Participates in the testing process through test review and analysis, test witnessing and certification of software Develops software documentation Works with system engineering team or software team lead to review and validate system requirements and to derive software requirements from system/subsystem requirements REQUIRED QUALIFICATIONS Eleven [11] years experience in software development and maintenance: ie. software requirements analysis, software design including object oriented analysis and design, coding, testing, documentation, configuration management, user training, deployment, life cycle maintenance.(Relevant Degrees: Electrical/Computer/Software Engineering, Computer Science, Math or Information Systems) Documented formal training on the Software Engineering Institute (SEI) Capability Maturity Model Integration for Development (CMMI-DEV) model or documented experience working on projects that applied some portions of this model Documented formal training on DOD standards for software testing and documentation or documented experience working on projects that applied these standards TS/SCI with CI Poly and CCA Required ADDITIONAL TECHNICAL SKILLS REQUIRED Experience in x86/x64 assembly and/or C, C++, software reverse engineering, kernel debugging, and/or protocol stacks Experience developing computer exploits Experience in Software Reverse Engineering with at least 1 of the following tool or an equivalent: IDAPro, GDB, WinDbg, Immunity/OllyDbg PREFERRED TECHNICAL SKILLS Experience in malware analysis and mitigation techniques Strong understanding of the Windows and Linux Operating System internals and APIs Knowledge of analyzing shellcode, packed and obfuscated and the associated algorithms a plus Experience with scripting languages such as Python, Bash, Pearl, etc Experience in host and network analysis to identify and characterize anomalies and vulnerabilities in the platform Experience documenting findings in reports and briefings Security certifications a plus: CISSP, C|EH, CREA, GPEN, GREM, OSCP, OSCE
#J-18808-Ljbffr