CNO Developer at SAIC
Fort Meade, MD 20755, USA -
Full Time


Start Date

Immediate

Expiry Date

19 Nov, 25

Salary

200000.0

Posted On

19 Aug, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Python, C++, Sparc, Debuggers, Assembly, Ida Pro, Polygraph, 68K, Routing Protocols, Ollydbg, Embedded Systems, Windbg, Vulnerability Research, Software Systems, C, X64, Ppc, X86

Industry

Information Technology/IT

Description

Job ID: 2508777
Location: FORT MEADE, MD, US
Date Posted: 2025-08-18
Category: Software
Subcategory: SW Engineer
Schedule: Full-time
Shift: Day Job
Travel: No
Minimum Clearance Required: TS/SCI with Poly
Clearance Level Must Be Able to Obtain: None
Potential for Remote Work: No
Description
SAIC, a leading provider of systems engineering & integration, systems development & deployment, intelligence analysis and targeting, and training solutions for the Intelligence Community, is seeking creative and dedicated professionals to fulfill their career goals and objectives while delivering mission excellence on programs of national importance.
Join SAIC on this newly awarded, 5-year contract where you can grow your career in a dynamic and supportive environment!
The CNO Developer designs, develops, and implements tools and capabilities for both offensive and defensive network operations. They will engage in reverse engineering to identify vulnerabilities and will develop tools for intrusion detection, penetration testing, and incident response. Utilizing their strong programming skills and knowledge of network operations, the ideal candidate will be able to efficiently and effectively create safeguards and solutions while simultaneously implementing offensive techniques to further the program’s mission.

Responsibilities include but are not limited to:

  • Analyze systems to understand how they operate and why errors occur
  • Develop and overcome new and advanced security techniques to ensure secure systems
  • Work with customer stakeholders to drive requirements from small to medium sized projects over the course of the development, test, and release cycles
  • Study disassembly or write Python to audit pieces of C++ code

Qualifications

  • Active TS/SCI with Polygraph
  • Bachelor’s degree from an accredited college/institution
  • Eight (8) years’ experience in Assembly, C, C++, or Python
  • Previous leadership experience

Desired Qualifications

  • Understanding of OS Internals (i.e. Windows, Linux, Android).
  • Experience with Vulnerability Research.
  • Experience reading or writing assembly (x86, x64, ARM, PPC, MIPS, SPARC, 68k, etc.)
  • Experience developing embedded systems and building and using tools to find, exploit, and productize vulnerabilities in complex software systems.
  • Understanding of network protocols (TCP/IP stacks, wire-level protocols, RF communications, BGP, routing protocols, etc.)
  • Understanding of exploit mitigations such as DEP and ASLR.
  • Experience using debuggers such as gdb, WinDbg, OllyDbg, experience with BDI/JTAG, and experience with modern C++ development, such as RAII, C++11, C++14.
  • Experience using reverse engineering tools such as IDA Pro, HexRays, Ghidra, Binary Ninja, or objdump.

Target salary range: $160,001 - $200,000. The estimate displayed represents the typical salary range for this position based on experience and other factors

Responsibilities
  • Analyze systems to understand how they operate and why errors occur
  • Develop and overcome new and advanced security techniques to ensure secure systems
  • Work with customer stakeholders to drive requirements from small to medium sized projects over the course of the development, test, and release cycles
  • Study disassembly or write Python to audit pieces of C++ cod
Loading...