[Close] 

Cyber Software Engineer 5 w/ Poly

Company Name:
Northrop Grumman
Description
Northrop Grumman Information Systems sector is seeking a
Software Developer
to join our team of qualified, diverse individuals in defining the future. As a Cyber Software Engineer 5, you will perform front-and back-end web and graphical user interface development to create views within the customer's system.

Roles and Responsibilities
:
We are looking for an experienced Software Engineer that is familiar with the full software lifecycle. Primary responsibilities are to perform software coding; duties also include participation in and support of each stage of the software development process. Tasks include coding and testing software based upon software specifications and designs; analyzing and studying complex system requirements; designing software tools to support software reuse and software development.

Candidates must have a current/active TS/SCI w/ Poly clearance.

No relocation assistance is available for this position.


Qualifications
Basic Qualifications:
- Must possess a current TS/SCI w/ Poly clearance
- Must have 14 Years experience with Bachelors in Science; 12 Years experience with Masters; 9 Years with PhD (or a total of 18 years of experience in lieu of a degree).
- Must have demonstrated Reverse Engineering experience.
- Must have demonstrated experience developing in OS X
- Must have Advanced/Expert experience in C programming for POSIX systems
- Strong assembly knowledge (including at least x86 and x86_64)
- Must have Advanced/Expert debugging experience
- Strong familiarity with software security technologies including ASLR, DEP, etc
Preferred Skills:
- Some kernel programming knowledge and familiarity
- Experience using disassemblers such as IDA Pro
- Experience with additional architectures (ARM, etc)
- Experience using Python and XML

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.