Overview: Quantum Research International, Inc. (Quantum) is a certified DoD Contractor providing services and products to US/Allied governments and industry in the following main areas: (1) Cybersecurity, High Performance Computing Systems, Cloud Services and Systems; (2) Space and Ground Support Systems; (3) Aviation Systems; (4) Missile Systems; (5) Artificial Intelligence/ Machine Learning Systems and Experimentation/Training; and (6) Audio Visual Systems and Services. Quantum's Corporate Office is in Huntsville, AL, but Quantum actively hires for positions nationwide and internationally. We pride ourselves on providing high quality support to the U.S. Government and our Nation's Warfighters. In addition to our corporate office, we have physical locations in Aberdeen; MD; Colorado Springs, CO; Orlando, FL; Crestview, FL; and Tupelo, MS.
Mission:
Quantum Research Intl is seeking a motivated and skilled intermediate Secure Software Assessor. As a member of the NGA DEFENDER Cybersecurity Software Assurance team, the contractor helps to determine the risk of using commercial, government, and open-source software within NGA and employs software code analysis techniques to mitigate risk during Software Development Life Cycles (SDLC). The Secure Software Assessor analyzes the security of new or existing computer applications, software, or specialized utility programs on or preparing to deploy on NGA systems and provides actionable results. This position is available immediately at NGA Campus East in Springfield, VA
Responsibilities:
-
Apply the automated enterprise NGA Software Assurance Process (SWAP) process for submission and adjudication of NGA software requests.
-
Capture security controls used during the requirements phase to integrate security within the process, to identify key security objectives, and to maximize software security while minimizing disruption to plans and schedules.
-
Consult with engineering staff to evaluate interface between hardware and software.
-
Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration.
-
Identify basic common coding flaws at a high level, identify security implications, and apply methodologies within centralized and decentralized environments across the enterprise's computer systems in software development.
-
Identify security issues around steady state operation and management of software and incorporate security measures that must be taken when a product reaches its end of life.
-
Analyze security needs and software requirements to determine feasibility of design within time and cost constraints and security mandates.
-
Conduct trial runs of programs and software applications to ensure that the desired information is produced, and instructions and security levels are correct.
Requirements:
-
TS/SCI eligible, subject to CI Polygraph
-
IAM or IAT Level 2- certifications or better
-
Bachelor's degree. In lieu of degree, Sec+, CSSLP, or GSEC may be accepted.
-
Experience with Computer Network Defense (CND) Intelligence Analysis, Assessments, and/or Open-Source Research.
-
Knowledge of Government standards for data security such as markings, handling of classified and unclassified information, and how to handle the distribution of this information.
-
Knowledge of computer networking concepts and protocols, and network security methodologies, as well as risk management processes (e.g., methods for assessing and mitigating risk).
-
Understands basic system and application security threats and vulnerabilities.
-
Familiar with the software development lifecycle.
Desired/Preferred Skills
-
Familiar with secure software deployment methodologies (agile, waterfall, devops, etc), tools, and practices.
- Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
Equal Opportunity Employer/Affirmative Action Employer M/F/D/V: All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, disability, veteran status, genetic information, sexual orientation, gender identity, or any other characteristic protected by law. *Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
#LI-JL1 #LI-Onsite
|