Senior AV Software Developer

Job Details Description The Senior AV Software Developer will be a seasoned developer who has extensive experience with development of defensive protective measures as well as security applications and database layers. This is an evolving opportunity seeking to employ cutting edge web applications to increase efficiency and performance supporting the Defense Department. The successful candidate will be motivated, team oriented, and have a drive to make a difference in warfighting capabilities The Senior AV Software Developer is responsible for meeting all technical anti-viral requirements on the program. You will assist efforts to develop and direct software system testing procedures, programming and documentation. This position designs, codes, tests, and implements tools for operations automation which means you need the ability to read and use the results of mobile code, malicious code, and anti-virus software. You should also have the ability to communicate networksecurity issues to peers and management  Primary Responsibilities: Apply software engineering skills, design skills, and creative thinking to assist in AV development Identify and refine project requirements, solutions to potentially abstract AV challenges, and well-defined performance metrics Translate project requirements into executable roadmaps for creating and measuring technical capability The candidate needs to have strong technical communication and leadership skills to lead investigations with engineers of multiple disciplines. Ability to work well with others internal to the effort and with external customers and technology partners Work in high intensity, joint teams of engineers and subject matter experts Be agile in the development methodology, while solving difficult problems and exploring new domains Security Clearance Requirements: TS required with SCI eligibility (TS/SCI preferred) Required Experience: More than 5 years' experience in working with anti-viral applications. 5 years or more experience in an engineering/network development environment supporting multiple concurrent tasks/projects. Solid experience and expertise in all aspects (application, network, operations, social) of Cybersecurity Familiar with Systems Engineering and its application to the development of IT solutions Familiar with Software Engineering methodologies (Agile in particular) Knowledgeable of continuous improvement frameworks (ITIL, CMMI, ISO, and PMI) Knowledgeable in Object Oriented programming languages (Java, C++) Familiarity and direct experience with several of the following technologies: Firewalls / Intrusion Protection Systems Data Leakage Prevention Systems PKI Encryption (CA, Encryption algorithms) Network Forensics (NetWitness, NetScout, NIKSUN, Solera) Full Packet Capture Security Information and Event Managers (IBM, Splunk, Alienware) Identity and Access Management Anti-Virus/Spyware/Malware Forensic Analysis Virtualization utilizing the above technologies Ability to present concepts and plans to senior management Required Education: Bachelor's Degree in Computer Science, Computer Engineering and Electrical Engineering preferred. MS or MBA degree is desirable. Equivalent combination of education, technical training, or work/military experience will be considered Desired Experience: DOD background/experience is a plus COMPANY INFORMATION: Applied Research Associates, Inc. is a growing employee-owned international research, engineering and technology services company. ARA supports career growth and rewards innovation, self-motivation, and technical excellence. ARA offices throughout the United States and Canada provide a broad range of technical expertise in defense technologies and services, civil technologies and services, computer software and simulation, systems analysis, environmental technologies, and testing and measurement. SENIO02221
Salary Range: NA
Minimum Qualification
5 - 7 years

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.