Capture security controls used during the requirements phase to integrate security within the process, to identify key security objectives, and to maximize software security while minimizing disruption to plans and schedules.
Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration.
Consult with engineering staff to evaluate interface between hardware and software.
Identify security issues around steady state operation and management of software and incorporate security measures that must be taken when a product reaches its end of life.
Analyze security needs and software requirements to determine feasibility of design within time and cost constraints and security mandates.
Apply the automated enterprise NGA Software Assurance Process (SWAP) process for submission and adjudication of NGA software requests.
Conduct trial runs of programs and software applications to ensure that the desired information is produced, and instructions and security levels are correct.
Identify basic common coding flaws at a high level, identify security implications, and apply methodologies within centralized and decentralized environments across the enterprise's computer systems in software development.
Requirements
bachelor's
sec+
iam
cnd
devops
ts/sci
Bachelor’s degree. In lieu of degree, Sec+, CSSLP, or GSEC may be accepted.
IAM or IAT Level 2- certifications or better
Understands basic system and application security threats and vulnerabilities.
Knowledge of Government standards for data security such as markings, handling of classified and unclassified information, and how to handle the distribution of this information.
Knowledge of computer networking concepts and protocols, and network security methodologies, as well as risk management processes (e.g., methods for assessing and mitigating risk).
Familiar with secure software deployment methodologies (agile, waterfall, devops, etc), tools, and practices.
Familiar with the software development lifecycle.
TS/SCI eligible, subject to CI Polygraph
Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
Benefits
Information not given or found
Training + Development
Information not given or found
Interview process
Information not given or found
Visa Sponsorship
Information not given or found
Security clearance
ts/sci eligibility required, subject to ci polygraph
Company
Overview
Founded 1987
Company起源
The company was established in 1987 in Huntsville, Alabama.
$150M Revenue
Annual收入
Annual revenues for the company are reported to be approximately $150 million.
356 Employees
员工数量
The company employs approximately 356 skilled professionals across various domains.
10+ Years Support
持续时间
They’ve provided NSA-level high-performance computing support for over a decade.
Evolved into a global services and technology partner operating across cyber, space, air, land, maritime and advanced AV domains.
Headquartered near Redstone Arsenal and Cummings Research Park, with regional offices across the U.S. and support locations worldwide.
Typical projects include weapon-system analysis, cybersecurity operations centres, satellite communications ground-systems, and model-based systems engineering.
Deep technical offerings span software development, cyber monitoring & pen-testing, AI testing, cloud services (including AWS partnership), PNT assurance, HPC support, and missile warning/air-defence ops.
They ran the Army’s cyber-security operations centre before such terms became popular.
Culture + Values
Dedicated to providing innovative solutions to our customers’ toughest problems.
Our team of highly qualified professionals is our greatest strength.
Our talented team works with one purpose in mind – to have a positive impact helping our customers meet or exceed their tactical and strategic goals.
Always seeking high quality, proven performers to join our team dedicated to vision, service and quality!
Environment + Sustainability
Committed to protecting the environment and improving people's everyday lives.
Committed to minimizing environmental impacts, complying with legal requirements, and continuously improving processes, products, and services.
No explicit net-zero target found on public site or LinkedIn.
Inclusion & Diversity
No DEI strategy, goals, outcomes, or gender-related statistics are available on the company's website or LinkedIn.