Perform secure programming and identify potential flaws in codes to mitigate vulnerabilities.
Capture security controls used during the requirements phase to integrate security within the process, to identify key security objectives, and to maximize software security while minimizing disruption to plans and schedules.
Develop secure code and error handling.
Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration.
Conduct code analysis and perform root cause analysis.
Identify basic common coding flaws at a high level and security implications and apply methodologies within centralized and decentralized environments across the enterprise's computer systems in software development.
Identify security issues around steady state operation and management of software and incorporate security measures that must be taken when a product reaches its end of life.
Conduct trial runs of programs and software applications to ensure that the desired information is produced, and instructions and security levels are correct.
Apply coding and testing standards, apply security testing tools including "'fuzzing" static-analysis code scanning tools, apply secure code documentation, and conduct code reviews.
Compile and write documentation of program development and subsequent revisions, inserting comments in the coded instructions so others can understand the program.
Design, develop, and modify software systems, using scientific analysis and mathematical models to predict and measure outcome and consequences of design.
Correct errors by making appropriate changes and rechecking the program to ensure that desired results are produced.
Prepare detailed workflow charts, diagrams, and dashboards that describe input, output, and logical operation, and convert them into a series of instructions coded in a computer language.
Create programs that validate and process multiple inputs including command line arguments, environmental variables, and input streams.
Address security implications in the software acceptance phase including completion criteria, risk acceptance and documentation, common criteria, and methods of independent testing.
Perform integrated quality assurance testing for security functionality and resiliency attack.
Develop secure software according to secure software deployment methodologies, tools, and practices .
Confer with systems analysts, engineers, programmers, and others to design application and to obtain information on project limitations and capabilities, performance requirements, and interfaces.
Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change.
Analyze information to determine, recommend, and plan the development of a new application or modification of an existing application, and analyze user needs and software requirements to determine feasibility of design within time and cost constraints.
Design secure test plans (e. g. unit, integration, system, acceptance).
Identify and leverage the enterprise-wide version control system while designing and developing secure applications.
Requirements
python
cissp-issap
bachelor’s
ml/nlp
iat-3
ts/sci
Knowledge of cybersecurity and privacy principles, cyber threats and vulnerabilities, and the specific operational impacts of cybersecurity lapses.
Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
Bachelor’s degree. In lieu of degree, CISSP-ISSAP may be accepted.6 years exp or more
Ability to develop secure software according to secure software deployment methodologies, tools, and practices.
Knowledge of cybersecurity and privacy principles and methods that apply to software development.
IAT Level 3 (or better a plus)
Ability to tailor code analysis for application-specific concerns.
Experience with Machine Learning projects and Natural Language Processing.
TS/SCI eligible, subject to CI Polygraph
Strong background in Python.
Understands complex data structures and computer programming principles.
Understands secure configuration management techniques, software debugging principles, software design tools, methods, and techniques, and software development methodologies (e.g., Agile, DevOps, etc).
Benefits
Information not given or found
Training + Development
Information not given or found
Interview process
Information not given or found
Visa Sponsorship
Information not given or found
Security clearance
ts/sci eligibility required, subject to ci polygraph
iat level 3 clearance (or higher) preferred
Company
Overview
Founded 1987
Company起源
The company was established in 1987 in Huntsville, Alabama.
$150M Revenue
Annual收入
Annual revenues for the company are reported to be approximately $150 million.
356 Employees
员工数量
The company employs approximately 356 skilled professionals across various domains.
10+ Years Support
持续时间
They’ve provided NSA-level high-performance computing support for over a decade.
Evolved into a global services and technology partner operating across cyber, space, air, land, maritime and advanced AV domains.
Headquartered near Redstone Arsenal and Cummings Research Park, with regional offices across the U.S. and support locations worldwide.
Typical projects include weapon-system analysis, cybersecurity operations centres, satellite communications ground-systems, and model-based systems engineering.
Deep technical offerings span software development, cyber monitoring & pen-testing, AI testing, cloud services (including AWS partnership), PNT assurance, HPC support, and missile warning/air-defence ops.
They ran the Army’s cyber-security operations centre before such terms became popular.
Culture + Values
Dedicated to providing innovative solutions to our customers’ toughest problems.
Our team of highly qualified professionals is our greatest strength.
Our talented team works with one purpose in mind – to have a positive impact helping our customers meet or exceed their tactical and strategic goals.
Always seeking high quality, proven performers to join our team dedicated to vision, service and quality!
Environment + Sustainability
Committed to protecting the environment and improving people's everyday lives.
Committed to minimizing environmental impacts, complying with legal requirements, and continuously improving processes, products, and services.
No explicit net-zero target found on public site or LinkedIn.
Inclusion & Diversity
No DEI strategy, goals, outcomes, or gender-related statistics are available on the company's website or LinkedIn.