Software Developer/Engineer - Mid 0010MD 1618
- Fort Meade, MD
- Permanent
- Full-time
- Familiarity with and ability to meet/exceed performance-based certification for USCYBERCOM Capability Developer JQRs.
- Support research and development, as well as test and evaluation, for software applications, translating operational requirements into technical solutions that provide novel cyberspace capabilities or modernize existing cyberspace capabilities.
- Demonstrable proficiency in creating, debugging, patching, and maintaining software and/or applications in a variety of computer languages, (Python, C++, Java, etc.).
- Effectively use computer-assisted software engineering (CASE) tools, automated testing tools, and infrastructure as code (IaC) capabilities.
- Familiarity with the design and implementation of conceptual, logical, and physical models of software systems and architectures, including microservices, monolithic, and event-driven architectures
- Assist in integrating new/ improved cyberspace capabilities into cyber operation platforms and weapon systems to support cyber operations, intelligence preparation of the cyber battlespace, and cyber effects operations.
- Ability to develop, and refine cyberspace tradecraft and Tactics, Techniques, and Procedures (TTPs) to support mission requirements
- Demonstrate strong communication skills to assist the team in gathering, analyzing, prioritizing, and delivering high-quality products on time while continually identifying and mitigating risks and vulnerabilities.
- Be a proactive team player willing to improve others while continuously learning and identifying ways to strengthen the team.
- Demonstrate ability to make decisions, estimates, and recommendations under conditions of urgency based on good judgment, experience, and professional standing.
- Stay updated on the latest advancements in software development, research, and technologies and identify opportunities for innovation and improvement.
- Demonstrate ability to research and apply new tools, techniques, and solution approaches. Continually learn and improve your skills through sharing with others and taking advantage of available training sources.
- Experience working in software development, software engineering, or related fields.
- Strong proficiency in two or more programming/scripting languages (C, C++, Assembly, Python, Perl Ruby, Bash, Node.js, Spark, Ansible, Puppet, Chef, SALT, Kafka, Hadoop, R, Rust, Go, Java, etc.).
- Proficiency in documentation, configuration management, and Quality assurance to ensure codebase meets requirements, allows for easy updates and future iterations, and performs as expected to meet all secure coding practices to ensure regulation and compliance requirements are met
- Solid understanding/ knowledge of multiple architectures (x86/64, ARM, and MIPS, etc).
- Understanding of exploit development techniques, (arbitrary code execution, privilege execution, obfuscation techniques, etc.).
- Experience with cross-compile tools across architectures.
- Skilled at simulation/model development and prototyping
- Experienced developing unit, integration, system, and acceptance tests.
- Familiarity with disassemblers/ decompilers, (IDA Pro, Ghidra, Radare, or Binary Ninja, etc.).
- Proficiency with software debuggers, (WinDbg, OllyDbg, GDB, KGDB, NTSD, IDA Debugger, etc.).
- Excellent problem-solving and analytical skills, with a keen attention to detail.
- Strong communication and collaboration skills with the ability to work independently or in a team environment.
- Bachelor’s degree in computer science, electrical engineering, mathematics, or related field. Master's or Ph.D. preferred.
- Proficiency in three or more of the programming/scripting languages listed under required skills.
- Certifications (e.g., GIAC Exploit Researcher and Advanced Penetration Tester (GXPN), GIAC Python Coder (GPYC), GIAC Certified Unix Security Administrator (GCWN), Offensive Security Exploitation Expert (OSEE), Offensive Security Certified Expert (OSCE), or Offensive Security Web Expert (OSWE), or other similar technical certifications).
- Certifications (e.g., GIAC Exploit Researcher and Advanced Penetration Tester (GXPN), GIAC Python Coder (GPYC), GIAC Certified Unix Security Administrator (GCWN), Offensive Security Exploitation Expert (OSEE), Offensive Security Certified Expert (OSCE), or Offensive Security Web Expert (OSWE), or other similar technical certifications).
- Certifications in computer programming, science, data science, or related fields (e.g., Certified Software Development Professional (CSDP); Certified Scrum Developer (CSD); Red Hat Certified Enterprise Application Developer; Professional Software Developer Certification (PSD); AWS Certified Developer – Associate; Microsoft Certified: Azure Developer Associate; Certified Secure Software Lifecycle Professional (CSSLP); Programming Language Certified Associate (CLA); C Certified Professional Programmer (CLP); C++ Certified Associate Programmer (CPA); C++ Certified Professional Programmer (CPP), etc.).