CNO Software Developer

at  Invictus International Consulting LLC

Fort Meade, MD 20755, USA -

Start DateExpiry DateSalaryPosted OnExperienceSkillsTelecommuteSponsor Visa
Immediate24 Oct, 2024Not Specified25 Jul, 2024N/APython,Bash,X86,Scripting Languages,Ida Pro,Javascript,Reverse Engineering,Software Development,Network Programming,C++NoNo
Add to Wishlist Apply All Jobs
Required Visa Status:
CitizenGC
US CitizenStudent Visa
H1BCPT
OPTH4 Spouse of H1B
GC Green Card
Employment Type:
Full TimePart Time
PermanentIndependent - 1099
Contract – W2C2H Independent
C2H W2Contract – Corp 2 Corp
Contract to Hire – Corp 2 Corp

Description:

REQUIREMENTS:

  • Bachelor’s degree in a technical discipline preferred; graduate of Computer Network Operations Development Program (CNODP) or equivalent program is preferred
  • Development proficiency in C/C++, Assembly (ARM, X86, MIPS, AARCH64) and shell coding
  • Experience with vulnerability analysis, exploit development, and PoC dev
  • Extensive experience with in low-level & embedded systems software development
  • Hands-on experience in Software Reverse Engineering (SRE) using tools such as IDA Pro, Binary Ninja, GDB, and Ghidra
  • Knowledge of recent scripting languages: PYTHON, Bash, JavaScript, etc.
  • Experience with low-level operating systems architecture & network programming
  • Current TS/SCI clearance with a CI polygraph

Responsibilities:

  • Perform CNO support activities that enable customer and partners improve its CNO and overall security posture, policies, and procedures
  • Support the research, development, engineering, and testing of tailored capabilities to secure, exploit, and analyze solutions
  • Perform extensive research in vulnerabilities to determine weaknesses and methods of exploitation that support capabilities development and reports
  • Perform vulnerability management, research, analysis, and characterization of adversary targets of interest
  • Identify technical and operational susceptibilities of the adversary function that, through refinement can become technical and operational vulnerabilities
  • Perform research, development, T&E including prototyping, experiments, demonstrations, and other activities to rapidly operationalize technologies
  • Support in various activities in computer network exploitation and attack, Reverse Engineering (RE), penetration testing, social engineering, exploit development, security testing, red teaming, threat emulation, and application development for software and embedded systems
  • Conduct target modeling to further understand the complexity of the target and to identify the effect on the larger adversary networks and systems based on different operational scenarios


REQUIREMENT SUMMARY

Min:N/AMax:5.0 year(s)

Information Technology/IT

IT Software - Network Administration / Security

Software Engineering

Graduate

Operations

Proficient

1

Fort Meade, MD 20755, USA