Identify cyber capabilities strategies for custom hardware and software development based on mission requirements.
Apply and incorporate information technologies into proposed solutions.
Prepare and possibly present briefings and produce white/research papers.
Research current technology to understand capabilities of required system or network.
Follow software and systems engineering life cycle standards and processes.
Collaborate with stakeholders to identify and/or develop appropriate solutions technology.
Research and evaluate available technologies and standards to meet customer requirements.
Identify cybersecurity and/or reverse engineering tools to enhance capabilities and detect vulnerabilities.
Identify functional- and security-related features to find opportunities for new capability development to exploit or mitigate vulnerabilities.
Apply the systems engineering process and design the integration of technology processes and solutions, including legacy systems and modern programming languages.
Requirements
iat ii
bachelor's
ceh
hacking
network security
risk management
IAT Level 2 / DoD 8570 IAT II certification or better
Bachelor’s degree in Computer Science or Information Systems or other technically relevant degree. In lieu of degree, GCLD, CCE, CASP+, or CEH may be accepted.
Familiar with hacking methodologies, and industry technologies’ potential cybersecurity vulnerabilities
Communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
Familiar with new and emerging information technology (IT) and cybersecurity technologies, and information technology (IT) supply chain security and supply chain risk management policies, requirements, and procedures.
Understands computer networking concepts and protocols, network security methodologies, and risk management processes (e.g., methods for assessing and mitigating risk).
Understands the capabilities, applications, and potential vulnerabilities of network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware.
Knowledge of cybersecurity and privacy principles, cyber threats and vulnerabilities, and the specific operational impacts of cybersecurity lapses.
Benefits
Information not given or found
Training + Development
Information not given or found
Interview process
Information not given or found
Visa Sponsorship
Information not given or found
Security clearance
ts/sci eligible, subject to ci polygraph.
Company
Overview
Founded 1987
Company起源
The company was established in 1987 in Huntsville, Alabama.
$150M Revenue
Annual收入
Annual revenues for the company are reported to be approximately $150 million.
356 Employees
员工数量
The company employs approximately 356 skilled professionals across various domains.
10+ Years Support
持续时间
They’ve provided NSA-level high-performance computing support for over a decade.
Evolved into a global services and technology partner operating across cyber, space, air, land, maritime and advanced AV domains.
Headquartered near Redstone Arsenal and Cummings Research Park, with regional offices across the U.S. and support locations worldwide.
Typical projects include weapon-system analysis, cybersecurity operations centres, satellite communications ground-systems, and model-based systems engineering.
Deep technical offerings span software development, cyber monitoring & pen-testing, AI testing, cloud services (including AWS partnership), PNT assurance, HPC support, and missile warning/air-defence ops.
They ran the Army’s cyber-security operations centre before such terms became popular.
Culture + Values
Dedicated to providing innovative solutions to our customers’ toughest problems.
Our team of highly qualified professionals is our greatest strength.
Our talented team works with one purpose in mind – to have a positive impact helping our customers meet or exceed their tactical and strategic goals.
Always seeking high quality, proven performers to join our team dedicated to vision, service and quality!
Environment + Sustainability
Committed to protecting the environment and improving people's everyday lives.
Committed to minimizing environmental impacts, complying with legal requirements, and continuously improving processes, products, and services.
No explicit net-zero target found on public site or LinkedIn.
Inclusion & Diversity
No DEI strategy, goals, outcomes, or gender-related statistics are available on the company's website or LinkedIn.