Experienced Full Stack Developer: Junior, Mid, and Senior Levels (TS/SCI with Poly Required to Apply)

Cipher Tech Solutions
Vienna, VA, USA
Full-time
Quick Apply

Description :

Cipher Tech seeks those who enjoy both Web Development and traditional Software Development combined into one career seat! During your career with us, you will provide support in the form of application development, scripting, debugging, and value-added development expertise to a digital forensic lab and malware reverse engineering section.

Additionally, you will maintain existing applications and develop new applications to customer specifications.

Developers will work with a variety of technologies including web services, client applications, plugins, and scripts.

Location : Vienna, VA

Vienna, VA

Requirements :

  • Must be a US Citizen (no exceptions)
  • Must hold an active US government security clearance at the TS / SCI level with polygraph
  • Must hold a Bachelor's degree in Computer Science, Electrical / Computer Engineering, Math, or Physics, or be within 12 months of graduation.
  • Must have 2 years (minimum) related experience outside of a classroom setting
  • Due to a heavy focus on web applications and plugins, experience is required (non-academic strongly preferred) in at least one of each of the technologies in the following lists :
  • PHP, Java, Python, NodeJS, C#
  • Javascript, jQuery, Angular, AngularJS
  • Additional proficiency in one of the following programming languages is necessary :
  • C, C++, Java, or Python
  • Strong working knowledge of PHP, Javascript and / or Angular
  • Capable of debugging software applications
  • Familiarity with high and low level programming languages
  • Able to gather testable software requirements
  • Able to participate in the design of new software applications
  • Familiarity with maintainable software processes including :
  • Software documentation
  • Source code versioning
  • Unit testing
  • Able to quickly adapt to new situations and problems
  • Able to operate in a mission-critical and time-sensitive environments
  • Key qualities : Self-motivated, Detail-oriented, Strong work ethic

Desirable :

  • Familiarity with assembly languages
  • Familiarity with digital forensics
  • Familiarity with hex editors and working at the byte-level
  • Familiarity with the Windows API
  • Familiarity with IDA Pro
  • Rudimentary understanding of protocol analysis
  • Rudimentary understanding of malware analysis or reverse engineering
  • Experience in digital forensics
  • Experience in SQL
  • Rudimentary knowledge in Network Architecture and networked programs
  • Experience in secure programming for web application development
  • Experience with the software development lifecycle to include requirements definition and unit testing
  • For entry-level candidates : Programming experience outside of a classroom, such as an internships, clubs, contributions to open source projects or other side projects

Benefits :

  • Mission focused work environment
  • Subsidized medical / dental / vision insurance
  • HSA contributions
  • 401k matching
  • Holiday and Paid Time Off (PTO)
  • Monthly WAN parties & quarterly events
  • Flexible hours

Education Requirements :

Junior-Level :

Candidates must possess a relevant bachelor's degree, with at least 2 years minimum programming experience outside of the classroom.

Mid-Level :

Candidates must possess a relevant bachelor's degree and have a minimum of 5 years' experience OR possess a relevant master's degree and have a minimum of 3 years' experience.

Senior-Level :

Candidates must possess a relevant bachelor's degree and have a minimum 10 years' experience OR possess a relevant master's degree and have a minimum of 8 years' experience.

Remote work is not an option. We do offer relocation assistance. Please see our careers page or inquire with your recruiter about the terms and conditions.

Vaccination Notice :

Please be aware that you are applying for a position to work as a federal contractor. As such, Cipher Tech will require, and your employment will be subject to, such vaccinations as are required by federal, state, and local law requirements.

ABOUT US

At Cipher Tech Solutions, Inc. (Cipher Tech), we take great pride in supporting some of the most mission critical work in the Department of Defense and the Intelligence Community.

The majority of our company is comprised of extremely talented software developers who write production tools which directly support one of two missions : digital forensics and malware reverse engineering.

Digital forensics is the practice of extracting and processing evidence from computers, phones, tablets, cameras, flash-drives, and just about any other form of digital media.

The results of our work are then used to support federal and military law enforcement, counter intelligence, and counter terrorist activities.

Malware reverse engineering is the practice of analyzing extremely advanced malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as :

  • How did it infect the victim's computer
  • What kind of information it is seeking to steal
  • How is it communicating with the author (actor)
  • Who that actor might be.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity or national origin.

Commitment to Diversity & Inclusion :

Cipher Tech is an Equal Opportunity and Affirmative Action Employer. We value diversity and inclusion, not only for the sake of compliance, but also because diversity of thought drives progress and improves performance.

All hiring and employment decisions are made on the basis of business requirements, performance, and merit-with no regard to race, color, religion, sexual orientation, gender, gender identity, national origin, or other protected status .

Important :

Be aware that you are applying for a job that requires a U.S. Government Security Clearance.

The U.S. government will not issue security clearances to recent users of illegal drugs. On your application to us, you must acknowledge that you have not engaged in any illegal drug use within the past twelve months (illegal drug use includes, but is not limited to, the use of illegal substances, the misuse of prescriptions, the misuse of over-the-counter substances, and the use of medical or recreational marijuana that may be deemed legal at the state level but is still considered illegal by the federal government).

NOTE : CIPHER TECH WILL NOT DISCRIMINATE AGAINST ANY QUALIFIED APPLICANTS WITH A DISABILITY, INCLUDING ILLEGAL DRUG USERS WHO HAVE RECENTLY SOUGHT PROFESSIONAL TREATMENT FOR A DRUG PROBLEM.

Job Posted by ApplicantPro

6 days ago
Related jobs
Promoted
Cipher Tech Solutions
Oakton, Virginia

The goal of a reverse engineer is to understand how the malicious code works and determine facts such as: how did it infect the victim's computer, what kind of information it is seeking to steal, how is it communicating with the author (actor), and who that actor might be working for. As such, Ciphe...

Promoted
Acuity
Arlington, Virginia

Recognized by The Washington Post's "Top Workplaces" and a nine-time recipient of the Washington Business Journal's "Best Places to Work," Acuity fosters an environment where innovation thrives and employees flourish. Full Stack Engineer with React/Java experience to support a hi...

Jacobs
Springfield, Virginia

Communicates with technical personnel and interpret technical status and progress to non-technical staff/customers to ensure progress, issues and risk are discussed and addressed early. The program manager position is a partnership with us and a Government customer to manage a large program responsi...

General Dynamics Information Technology
Tysons, Virginia

Establish a process to formally and proactively control and manage changes to requirements, consider impacts prior to commitment to change, gain stakeholder buy-in, eliminate ambiguity, ensure traceability to source requirements, and track and settle open actions. The ideal candidate is someone with...

Next Step Systems – Recruiters for Information Technology Jobs Top IT Recruiting Firm
Reston, Virginia

Cloud Engineer, TS/SCI with a Full Scope Polygraph Security Clearance is Required, Reston, VA. Home»Cloud Engineer, TS/SCI with a Full Scope Polygraph Security Clearance is Required. The qualified Cloud Engineer must have an active TS/SCI with a Full Scope Polygraph security clearance. Must have an ...

EliteTechnical
Sterling, Virginia

Utilize full-stack development expertise that ranges from client development of markup and styling to OS level services, and server-side containers and database technologies. Our client, a prestigious Federal contractor, is seeking Junior/Mid Full Stack. The role is mostly remote and the candidate w...

General Dynamics
Chantilly, Virginia

Project assignments will vary based on skill level, and may include engineering geographically dispersed services, integrating services into public, private and hybrid cloud environments, engineering solutions to be deployed via automated CM tools, and hardening the solutions to address security and...

Capital One
McLean, Virginia

Lead a portfolio of diverse technology projects and a team of developers with deep experience in distributed microservices, and full stack systems to create solutions that help meet regulatory needs for the company. Capital One will consider for employment qualified applicants with a criminal histo...

General Dynamics
Herndon, Virginia

Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology. Your systems administration/engineering work in a cyber security environment will have an impact on securing our clients' missions and ensuring we anticipate the t...

Microsoft
Reston, Virginia

Candidates must have an active  TS/SCI  and be willing to upgrade to TS/SCI (with polygraph). Holds team accountable for participation in on-call rotations and manages teams of Service Engineers responding to incidents to identify the level of impact, troubleshoot issues, and deploy appropriate fixe...