Job Directory Chief Cyber Software Analyst

Chief Cyber Software Analyst
El Segundo, CA

Companies like
are looking for tech talent like you.

On Hired, employers apply to you with up-front salaries.
Sign up to start matching for free.

About

Job Description

Requisition ID: 45273

All Locations: El Segundo, CA (California)

A trusted partner. A national resource. A leader in national security space. We are THE Aerospace Corporation. A team that takes pride in our readiness to solve some of the most complex technical challenges in existence. With challenges spanning government to commercial, you'll have the unique opportunity to work on projects that are literally evolving our nation's space and launch capabilities. We all share a common passion and aspiration - to serve a mission much bigger than ourselves. When you join our team, you'll be part of a rare collection of thought leaders and game-changing innovators. Are you ready to launch your career?

Responsibilities

Are you the "go to" person in your organization for software static and dynamic code analysis? Do you know all of the features that your code analysis tools provide and can you make use of them in relation cyber security? If so, you may be the team lead that we're looking for! The Aerospace Corporation is in search of a code analysis guru, someone who can step up our game and teach our experienced code analysis professionals how to be even better at what they do.

Key Functions:

* Act as a subject matter expert in all aspects of software code analysis with a focus on cybersecurity
* Develop a team of code analysis professionals to leverage your expertise and make The Aerospace Corporation the authority on secure code for space systems
* Perform static and dynamic analysis on software for space systems, including embedded system software
* Advise customers on best practices for secure coding, on requirements to ensure secure code is developed by their contractors including in a DevSecOps environment, and on ensuring the code in the systems they acquire is secure

Qualifications

Required

* 12 or more years of software development and analysis experience. Cybersecurity focused experience is desirable.
* Extensive experience with software analysis tools including Fortify, AFL, Val Grind, IDA Pro, or others. Familiarity with MISRA C and software reverse engineering skills.
* Understanding of DevSecOps and CD/CI with ability to work with development and operations staff to create DevSecOps environment
* Familiarity with variety of operating systems including Windows (workstation and server variants), Linux (primarily server variants, Kali).
* Extensive understanding of variety of coding languages including C, C++, Java and Python. Experience with Ada highly desired.
* Initiative and ability to operate within high performing teams and prioritize emergent issues to meet near- and long-term personal and team commitments.
* Demonstrated experience in generating high quality whitepapers and presentations. Ability to speak authoritatively to support assertions with data and experience.
* Ability to travel
* Ability to obtain and maintain a Top Secret/SCI clearance which is issued by the US government. US citizenship is required to obtain a security clearance.

Preferred

* An advanced degree and/or cybersecurity certifications are highly preferred.
* Current/active TS/SCI clearance
* Working knowledge of real-time/deterministic, embedded systems and software is desired, as well as real-time operating systems like VxWorks or Green Hills.
* Familiarity with Unix variants (Sun and IBM) and Posix
* Experience with space systems and missions
* Knowledge of DoD program acquisition processes, practices and documents. Experience in developing acquisition documentation supporting program decisions and milestones.
* Knowledge or experience with pertinent government directive, guiding and statutory cybersecurity documents.
* Experience in application of cybersecurity in systems engineering disciplines including system architecture, requirements engineering, verification, test, risk management, program protection, network security, threat and vulnerability analysis.

Transcript Requirement

None

Let your dream job find you.

Sign up to start matching with top companies. It’s fast and free.