Defensive Cyber Software Developer
Role details
Job location
Tech stack
Job description
Github Writing Tooling Research Equities Scripting Hardening Purchasing Upskilling Market Data Cryptography Daemon Tools Cyber Security Key Management CompTIA Linux+ Web Development Ancient History Computer Science CompTIA Network+ Network Security Network Analysis Agile Methodology CompTIA Security+ Network Protocols Computer Networks Analytical Method Time Off Management Security Engineering Computer Engineering Network Architecture Signals Intelligence Cyber Threat Hunting Programming Languages Command-Line Interface Application Development C (Programming Language) Vulnerability Management C++ (Programming Language) Computer Network Operations Python (Programming Language) Snort (Intrusion Detection System) CompTIA Cybersecurity Analyst (CySA+) Security Information And Event Management (SIEM) Top Secret-Sensitive Compartmented Information (TS/SCI Clearance), Leidos has a new and exciting opportunity for a Mid-Level Defensive Cyber Software Developer in our National Security Sector's (NSS) Cyber & Analytics Business Area (CABA). Our talented team is at the forefront in Security Engineering, Computer Network Operations (CNO), Mission Software, Analytical Methods and Modeling, Signals Intelligence (SIGINT), and Cryptographic Key Management. At Leidos, we offer competitive benefits, including Paid Time Off, 11 paid Holidays, 401K with a 6% company match and immediate vesting, Flexible Schedules, Discounted Stock Purchase Plans, Technical Upskilling, Education and Training Support, Parental Paid Leave, and much more. Join us and make a difference in National Security!
The Mid-Level Defensive Cyber Software Developer to work with a diverse, highly skilled team to develop unique solutions for Cyber, EW, and PNT threats against US weapon systems. Our products are responsible for alerting our varied array of customers of potential cyber and EW attacks by creative Adversaries highly skilled at attacking. With that problem set in mind, our solutions need to be developed by equally creative minds that enjoy digging, researching, programming, questioning, and generally learning all they can to anticipate in every way possible.
Since there are such broad attack vectors, our approach to developing detection measures and mitigations needs to have an equally broad scope. With that in mind, this position will grow and shift depending on skillsets gained as well as needs identified, as all the positions in our department do. Initially, we are seeking someone with skills in both Cyber (vulnerability research to detection engineering) and Programming (scripting to application development). This is a full-time on-site with the Leidos Cyber Electromagnetic Activity (CEMA) team that is based in Huntsville, Alabama, and will require the candidate to be able to obtain and maintain a TS/SCI Clearance., * Developing software and/or techniques in the protection of data, networks and host-centric capabilities, as well as detection of, identification of and response to attacks.
- Research and development of signature-based and behavior-based defensive techniques against adversarial attacks on tactical networks.
- Developing technical solutions that require collaboration with internal and external experts as well as; deep analyses and understanding of impact on end-product/solution., All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Leidos will also consider for employment qualified applicants with criminal histories consistent with relevant laws. Related Jobs xPL Assistant Project Developer Turner Construction Co. Huntsville, ALOn-Site Writing Bidding Teamwork Scheduling Operations Leadership Management Purchasing Coordinating Construction, Construction Engineering, Interpersonal Communications Building Information Modeling Continuous Improvement Process Key Performance Indicators (KPIs) +0 Mid-Level Software Engineer Leidos Huntsville, ALOn-Site JSON YAML Linux Junit CMake JAX-WS MongoDB Jenkins Mockito Planning Equities OpenShift Encodings Management Automation Purchasing Resilience Kubernetes Upskilling PostgreSQL XML Schema Code Reuse Market Data Build Tools Cryptography Apache Maven Java Servlet Communication Apache Tomcat Cyber Security Prioritization Key Management Formal Methods Version Control Software Design Fault Tolerance Sprint Planning Ancient History Spring Framework Pair Programming Canonicalization Agile Methodology Docker (Software) Data Flow Diagram Digital Signature Analytical Method Eclipse (Software) Application Layers WildFly (JBoss AS) Systems Engineering System Requirements Selenium (Software) Cucumber (Software) Application Servers Time Off Management Security Engineering Software Engineering Software Development Signals Intelligence Independent Thinking Java Persistence API Enterprise JavaBeans Java Transaction API JavaScript Frameworks Scaled Agile Framework Oracle WebLogic Server Complex Problem Solving Development Environment Requirements Management Angular (Web Framework) Microsoft Visual Studio Java Enterprise Edition Jersey (Java Framework) Public Key Cryptography Configuration Management Satellite Communications Public Key Infrastructure SQL (Programming Language) C++ (Programming Language) Java (Programming Language) Behavior-Driven Development Computer Network Operations Scrum (Software Development) Unified Field Theories (UFT) Python (Programming Language) Test-Driven Development (TDD) Groovy (Programming Language) Bootstrap (Front-End Framework) Extensible Markup Language (XML) HyperText Markup Language (HTML) JavaScript (Programming Language) Web Services Description Language Java API For RESTful Web Services Acceptance Test-Driven Development Integrated Development Environments Simple Object Access Protocol (SOAP) Karma (JavaScript Testing Framework) Jasmine (JavaScript Testing Framework) Extensible Stylesheet Language Transformations (XSLT) Top Secret-Sensitive Compartmented Information (TS/SCI Clearance) +0
Requirements
- Bachelor's Degree in computer science, computer engineering, cybersecurity, or similar degree with 4-8 years of experience.
- Minimum 4+ years of professional development in various programming languages with the ability to show ability either through GitHub, print outs, or even provided media).
- Intermediate Python and Bash
- Minimum 4+ years of professional cyber focused experience, or 6+ years of personal cyber focused experience such as capture the flag (CTF) events, extensive home hardening, conferences, sharable projects, or other similar endeavors.
- A good understanding of networking - protocols at all layers of the networking stack and network architecture accompanied with various tooling needed for network analysis such as Wireshark.
- Working knowledge of Linux on CLI (scripting, daemons, resource monitoring, networking, which ever editor you wish to argue is best, etc.)
- Must be a US CITIZEN and be able to obtain and maintain a TS/SCI Clearance, * Hands-on experience within a security operations center (SOC) with at least one SIEM under your belt as well as an experience with threat hunting that can be properly relayed during the interview.
- Experience with C/C++, Web Development, Agile process, and all the normal programming buzz words you might want to tell us about.
- Experience with Network Security Monitoring (NSM)
- Experience with writing custom detection rules in Suricata, Snort, Yara, Sigma, and/or similar formats
- Certifications such as Network+, Security+, CySA+, Linux+, PenTest+, Communication Digital Assets Project Design Follow Through Detail Oriented Problem Solving Microsoft Office Document Control Constructability Project Controls Computer Literacy Project Schedules Technical Analysis Material Selection Quantity Take-Offs Analytical Thinking Technological Change Organizational Skills Workforce Productivity Collaborative Software New Product Development Construction Management Contract Interpretation Fire Protection Systems Research And Development, Huntsville, AL*Remote JIRA CI/CD Tooling Planning Equities Codebase Usability Leadership Automation Mentorship Scalability Market Data Communication User Feedback Prioritization System Testing Test Automation Decision Making Team Leadership Solution Design Ancient History Front End Design People Management Agile Methodology Programming Tools Influencing Skills Product Management Software Solutions Software Development Technical Leadership Top Secret Clearance Cloud-Native Computing Artificial Intelligence Balancing (Ledger/Billing) Software Quality (SQA/SQC) Java (Programming Language) Rust (Programming Language) Scrum (Software Development) React.js (Javascript Library) Continuous Improvement Process JavaScript (Programming Language)
Benefits & conditions
Pay and benefits are fundamental to any career decision. That's why we craft compensation packages that reflect the importance of the work we do for our customers. Employment benefits include competitive compensation, Health and Wellness programs, Income Protection, Paid Leave and Retirement. More details are available at www.leidos.com/careers/pay-benefits .