CNO Software Developer
at Invictus International Consulting LLC
Fort Meade, MD 20755, USA -
Start Date | Expiry Date | Salary | Posted On | Experience | Skills | Telecommute | Sponsor Visa |
---|---|---|---|---|---|---|---|
Immediate | 24 Oct, 2024 | Not Specified | 25 Jul, 2024 | N/A | Python,Bash,X86,Scripting Languages,Ida Pro,Javascript,Reverse Engineering,Software Development,Network Programming,C++ | No | No |
Required Visa Status:
Citizen | GC |
US Citizen | Student Visa |
H1B | CPT |
OPT | H4 Spouse of H1B |
GC Green Card |
Employment Type:
Full Time | Part Time |
Permanent | Independent - 1099 |
Contract – W2 | C2H Independent |
C2H W2 | Contract – Corp 2 Corp |
Contract to Hire – Corp 2 Corp |
Description:
REQUIREMENTS:
- Bachelor’s degree in a technical discipline preferred; graduate of Computer Network Operations Development Program (CNODP) or equivalent program is preferred
- Development proficiency in C/C++, Assembly (ARM, X86, MIPS, AARCH64) and shell coding
- Experience with vulnerability analysis, exploit development, and PoC dev
- Extensive experience with in low-level & embedded systems software development
- Hands-on experience in Software Reverse Engineering (SRE) using tools such as IDA Pro, Binary Ninja, GDB, and Ghidra
- Knowledge of recent scripting languages: PYTHON, Bash, JavaScript, etc.
- Experience with low-level operating systems architecture & network programming
- Current TS/SCI clearance with a CI polygraph
Responsibilities:
- Perform CNO support activities that enable customer and partners improve its CNO and overall security posture, policies, and procedures
- Support the research, development, engineering, and testing of tailored capabilities to secure, exploit, and analyze solutions
- Perform extensive research in vulnerabilities to determine weaknesses and methods of exploitation that support capabilities development and reports
- Perform vulnerability management, research, analysis, and characterization of adversary targets of interest
- Identify technical and operational susceptibilities of the adversary function that, through refinement can become technical and operational vulnerabilities
- Perform research, development, T&E including prototyping, experiments, demonstrations, and other activities to rapidly operationalize technologies
- Support in various activities in computer network exploitation and attack, Reverse Engineering (RE), penetration testing, social engineering, exploit development, security testing, red teaming, threat emulation, and application development for software and embedded systems
- Conduct target modeling to further understand the complexity of the target and to identify the effect on the larger adversary networks and systems based on different operational scenarios
REQUIREMENT SUMMARY
Min:N/AMax:5.0 year(s)
Information Technology/IT
IT Software - Network Administration / Security
Software Engineering
Graduate
Operations
Proficient
1
Fort Meade, MD 20755, USA