NCI: As a Cyber Software Engineer II, you will provide services in support of the United States (U.S.) Army Cyber Command’s (ARCYBER) mission, to direct and conduct integrated Electronic Warfare (EW), Information Operations (IO), and Cyberspace Operations, as authorized or directed, to ensure freedom of action in and through cyberspace and the information environment, and to deny the same to adversaries. Cyber Application Specialist II. Designs, develops, deploys, tests, and evaluates cyber systems and applications. Coordinates resolution of application issues, upgrades, and problems. Conducts application configuration and optimization. Develops and maintains manuals, drawings, system specifications, electronic and hardcopy files of customer installations, calibration records, maintenance records, and quality control information. In assuming this position, you will be a critical contributor to meeting NCI's mission: To deliver innovative, cost-effective solutions and services that enable our customers to rapidly adapt to dynamic environments.
Highlights of Responsibilities:
Working as a SME supporting Defensive Cyberspace Operations Tactics Technics and Procedures
Conducts research and evaluates technical performance of software products and overall segments and systems
Ensures systems comply with requirements and IA standards
Verifies/validates systems with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to information networks
Participates in design reviews to ensure applicability to the current system and requirements traceability
Produces papers, presentations, recommendations, and findings for the government
Mentors mid-level and junior staff
Prepares Priority Incident Reports such as CDVs, incidents of interest, etc. to the Battle Captain on a daily basis
Responsible for preparing and updating Cybersecurity Service Provider accreditation documentation as required.
Expert in Cyber Warfare techniques, methods, and processes. Experience detecting, monitoring, analyzing, and mitigating cyber threats. Familiarity with CJCSM 6510.01B. Top Secret SCI required.
Education and Preferred Certifications and Experience:
This position requires the ability to perform the below essential functions: