Senior Cyber Capability Developer at Innovative Management Technology Services
Clarksburg, WV 26306, USA -
Full Time


Start Date

Immediate

Expiry Date

29 Oct, 25

Salary

0.0

Posted On

29 Jul, 25

Experience

7 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Software Analysis, Sonarqube, Cissp, Oscp, Ida Pro, Scripting Languages, Reverse Engineering, Malware Analysis, Dhs, Computer Science

Industry

Computer Software/Engineering

Description

COMPANY OVERVIEW:

Join a fast-growing company highly experienced in cyber security, cloud computing, virtualization, big data analytics, and project management! IMTS offers competitive compensation, excellent benefits including tuition reimbursement and employer-contributed 401K, and referral bonuses. We work with the best customers on-site at top government agencies.
Job Title: Senior Cyber Capability Developer
Primary Location: Clarksburg, WV - Hybrid
Clearance: Top-Secret (TS)

POSITION SUMMARY:

Are you passionate about defending critical systems from emerging cyber threats. As a Senior Reverse Engineer / Cyber Capability Developer, you’ll play a pivotal role in securing federal law enforcement infrastructure by uncovering vulnerabilities, analyzing potentially malicious software, and guiding secure development practices. You’ll work closely with ISSOs and development teams to evaluate applications, analyze malware, and drive secure coding standards across mission-critical systems.
This role is ideal for someone with deep technical expertise in reverse engineering, secure software analysis, and vulnerability detection — and a strong desire to protect national interests and public safety.

IMTS IS AN EQUAL OPPORTUNITY/AFFIRMATIVE ACTION EMPLOYER. ALL QUALIFIED APPLICANTS WILL RECEIVE CONSIDERATION FOR EMPLOYMENT WITHOUT REGARD TO SEX, GENDER IDENTITY, SEXUAL ORIENTATION, RACE, COLOR, RELIGION, NATIONAL ORIGIN, DISABILITY, PROTECTED VETERAN STATUS, AGE, OR ANY OTHER CHARACTERISTIC PROTECTED BY LAW.

aQS3Kt4W3

Required Qualifications:

  • Bachelor’s degree in Cybersecurity, Computer Science, Software Engineering, or a related field (or equivalent combination of education and experience).
  • 7+ years of experience in cybersecurity, software analysis, reverse engineering, or malware analysis.
  • Proven ability to:
  • Perform manual and automated static/dynamic analysis of both source code and binaries.
  • Use tools like IDA Pro, Ghidra, Binary Ninja, Radare2, and SonarQube.
  • Detect malicious logic, logic bombs, or zero-day threats in software artifacts.
  • Deep understanding of secure coding principles, SDLC, and software vulnerability classes (e.g., buffer overflows, injection flaws).
  • Experience with multiple programming and scripting languages.
  • Active Top Secret clearance is required.
  • U.S. Citizenship is required

Preferred Qualifications:

  • Experience supporting federal or law enforcement cybersecurity missions (CJIS, DoD, DHS, etc.).
  • Familiarity with firmware analysis, embedded system exploitation, and hardware debugging.
  • Knowledge of DevSecOps, CI/CD security practices, and secure cloud development environments.
  • Relevant certifications such as GREM, GXPN, OSCP, OSCE, or CISSP
Responsibilities
  • Conduct static analysis of source code in languages such as C, C++, Java, C#, Python, Groovy, JavaScript, Bash, PowerShell, and others.
  • Perform dynamic, manual, and automated binary reverse engineering on compiled applications and unknown binaries to detect vulnerabilities or embedded malicious logic.
  • Analyze firmware, hardware-level components, and known/unknown malware samples for behavioral patterns and exploit chains.
  • Design and develop internal tools, frameworks, scripts, and application extensions to support efficient and repeatable software security assessments.
  • Automate vulnerability scanning and integrate findings into secure development workflows.
  • Provide technical guidance on secure software development methodologies, including secure web development techniques and defense against OWASP Top 10 vulnerabilities.
  • Assess code libraries and frameworks against industry best practices and vulnerability databases.
  • Collaborate with Information System Security Officers (ISSOs) and CJIS stakeholders to identify and mitigate risks, threats, and vulnerabilities.
  • Deliver presentations, briefings, and knowledge transfer sessions to technical and non-technical audiences.
  • Develop detailed technical reports and assessments, including risk reports, secure code reviews, and vulnerability findings.

Required Qualifications:

  • Bachelor’s degree in Cybersecurity, Computer Science, Software Engineering, or a related field (or equivalent combination of education and experience).
  • 7+ years of experience in cybersecurity, software analysis, reverse engineering, or malware analysis.
  • Proven ability to:
  • Perform manual and automated static/dynamic analysis of both source code and binaries.
  • Use tools like IDA Pro, Ghidra, Binary Ninja, Radare2, and SonarQube.
  • Detect malicious logic, logic bombs, or zero-day threats in software artifacts.
  • Deep understanding of secure coding principles, SDLC, and software vulnerability classes (e.g., buffer overflows, injection flaws).
  • Experience with multiple programming and scripting languages.
  • Active Top Secret clearance is required.
  • U.S. Citizenship is required.

Preferred Qualifications:

  • Experience supporting federal or law enforcement cybersecurity missions (CJIS, DoD, DHS, etc.).
  • Familiarity with firmware analysis, embedded system exploitation, and hardware debugging.
  • Knowledge of DevSecOps, CI/CD security practices, and secure cloud development environments.
  • Relevant certifications such as GREM, GXPN, OSCP, OSCE, or CISSP.
Loading...