Security Software Engineer

Overview

On Site
Full Time

Skills

Security Controls
Regulatory Compliance
Security Clearance
Operating Systems
Virtualization
VMware
Metasploit
Nmap
OSCP
GPEN
Emulation
Web Services
Penetration Testing
RESTful
SOAP
Authentication
Python
C
C#
C++
Perl
Windows PowerShell
Debugging
Reverse Engineering
HP-UX
Unix
Solaris
Linux
Microsoft Windows
Research
Continuous Monitoring
RMF
Risk Management Framework
DoD
Publications
Business Analysis
Business Analytics
Computer Science
OSD

Job Details

The Security Software Engineer - Penetration Tester utilizes in-depth understanding and experience in computer science and complex penetration testing methodologies to assist in securing combat systems and PIT in both afloat and shore-based systems by identifying threat vectors and vulnerabilities..

Essential Job Functions:
  • Performs software code reviews to identify flaws in complied and human- readable software code.
  • Plan and perform Red Team and penetration testing to assess viability of security controls and policy compliance status.
  • Performs reverse engineering of malicious tools, threat systems and bugs to assist in securing systems or exploitation of threat systems.

Required Skills:

Due to the sensitivity of customer related requirements, U.S. Citizenship is required.

Active Top Secret security clearance with eligibility for SCI access.

Requires 5 years' experience and demonstrated knowledge of various operating systems including LINUX, Windows and virtualization tools such as VMWare.

Requires experience with working knowledge of common Penetration Testing (PENTEST) tools such as Kali, Metasploit, Nmap, Cobalt Strike.

Minimum certification as IAT Level II per DoD 8570.01 with a minimum certification as penetration tester and possess one the following offensive security certifications (OSCP, OSCE, OSEE, OSWP, GPEN, GXPN, or Red Team Operations and Threat Emulation).

Experience with Web Services penetration testing (RESTful and SOAP) Web Authentication protocols and using Programming tools such as Python, C, C Sharp, C++, Go, Perl, or Powershell.

Possess the ability to debug and reverse engineer software, analyze Windows events and Linux syslogs, boot logs and dmesg logs.

Possess the ability to identify security flaws in compiled and human readable source code and recommend software modifications to systems to mitigate known vulnerabilities; Operate and administer computer systems running HP-UX, UNIX, Solaris, Linux and Microsoft Windows..

researching, assessing and performing continuous monitoring under the RMF process in accordance with DoD 8510.01 and NIST Publications

Bachelor's (BS/BA) degree in computer science and five years' experience.

Desired Skills:

OSD Sponsored Cyber Operation Academy Course (COAC) graduate

Red Team Experience

Familiarity with Naval Combat Systems and Platform IT
7762
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.