Software Developer I Internet & Ecommerce - Severn, MD at Geebo

Software Developer I

Company Name:
ClearedPath
CRGT is seeking an experienced Computer Network Exploitation (CNE) Analyst for our location in Fort Meade, Maryland.
The candidate will be assigned to help propose, develop, and coordinate appropriate Computer Network Operations (CNO) course of actions (COAs) and capabilities. Prefer candidates with software development and Digital Network Analysis background. Specific Duties:
Must-Have Skills:
Develop measures of effectiveness (MOEs) and processes to conduct battle damage and effectiveness assessment, detect and assess likely enemy mitigation efforts, and identify potential collateral effects
Recommend courses of action based on analysis of both general and specific threats
Deliver reports, briefings, and assessments to customer leadership, facilitating in-depth technical and analytical understanding of cyber threat entities and environments
Support information assurance and cyber threat mitigation decision making
Develop and support Cyber Capabilities within the client organization
Minimum of three (3) years in commercial, Government, or academic setting, or four (4) years academic experience developing with object-oriented programming languages.
Digital Network Analysis (IDNA) and / or Advanced Digital Network Analysis (ADNA) experience preferred.
Demonstrated training / experience / knowledge of one of the following: C, C++, Perl, Java, Assembly Language, Hypertext Markup Language (HTML), JavaScript
Prefer at least one of the following certifications: COMPTIA A+, Security+, Network+, Linux
Working knowledge of system and network exploitation, attack pathologies and intrusion techniques; denial of service attacks, man in the middle attacks, malicious code delivery techniques, fuzzing, automated network vulnerability and port scanning, botnets, password cracking, social engineering, network and system reconnaissance.
Familiarity using the following tools: Cadence, Surrey, TrafficThief, CNE Portal and X-Keyscore. Analyst must also have working knowledge of collection systems and tools used to manage requirements along with the ability to develop new requirements and to provide assessments as needed on existing requirements.
Experience/ knowledge of Operating System theory including kernel functions, registry functions, process / thread handling, memory management, Remote Procedure Calls, Dynamic Link Libraries, file system manipulation, and application startup procedures.
Experience/ knowledge of buffer overflows and other code vulnerabilities, rootkit / malware discovery and removal, cross-site scripting, and incident response techniques.
Experience/ knowledge in computer networking concepts. Solid understanding of Transmission Control Protocol/Internet Protocol (TCP/IP), User Datagram Protocol (UDP)
Domain Name System (DNS), Address Resolution Protocol (ARP), Routing Information Protocol (RIP), Open Shortest Path First (OSPF), Interior Gateway Routing Protocol (IGRP). - Knowledge of typical network services and their associated ports (File Transmission Protocol (FTP), Secure Shell (SSH), TELNET network protocol, Network Basic Input/Output System (NetBIOS), Remote Procedure Call (RPC), Simple Mail Transmission Protocol (SMTP), Post Office Protocol 3 (POP3), Trivial File Transmission Protocol (TFTP), Secure Socket Layer (SSL)
Certified Information Systems Security Professional (CISSP)
Top Secret/SCI with Poly
Desired Skills:
Bachelor of Science Degree is preferred but not required, in Computer Science / Engineering, Information Systems Management, Information Assurance, Network Security, or other technical, IT-related field.
Incident Handling experience and forensic or digital media analysis training desired.
Understanding of TCP/IP and the functioning of its component protocols, ability to read, analyze, and parse packet dumps using various toolsets such as tcpdump, wireshark, editpcap, etc.
Intermediate to advanced malicious code analysis capabilities.
Certified Ethical Hacker
Other IT industry certifications in Operating Systems, networking, and network security
About Us:
CRGT Inc. is a leading provider of mission-critical, complex, and innovative information technology solutions to a diverse set of Federal Government customers. We provide expert solutions in the areas of Agile Software Development, Big Data and Analytics, Cyber Security and Infrastructure Optimization primarily to federal civilian agencies as well as the Department of Defense and the Intelligence Community. CRGT's solutions process terabytes of information, support tens of thousands of users, manage thousands of daily transactions, and significantly improve how our customers manage and respond to constantly evolving challenges.
CRGT focuses on delivering high-end services and solutions with key technology discriminators. Our customer base includes the U. S. Postal Service, the Department of Homeland Security, the Department of Treasury, the Securities and Exchange Commission, the Environmental Protection Agency, the Department of Transportation, the U.S. Army, and more. CRGT's experience spans 28 years, and as a mid-sized organization, we offer customers the flexibility they value especially in today's fast-paced market. CRGT is a portfolio company of Veritas Capital. For additional information on CRGT, please visit .
CRGT is an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status and or any other characteristic protected by law.Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.