The Contractor shall provide support for designing, engineering, implementing, and maintaining enterprise quality systems, networks, and applications for Cyber related investigations across the Sponsors initiatives.
The Contractor shall assist the Sponsor in the evaluation of software and associated documentation.
The Contractor shall collaborate with customers to evaluate or diagnose problems and recommend possible solutions.
The Contractor shall conduct historical analyses of test results.
The Contractor shall conduct software compatibility tests with programs, hardware, operating systems, or network environments.
The Contractor shall coordinate user or third party testing.
The Contractor shall create or maintain databases of known test defects.
The Contractor shall develop testing programs that address areas such as database impacts, software scenarios, regression testing, negative testing, error or bug retests, or usability.
The Contractor shall design or develop automated testing tools.
The Contractor shall design test plans, scenarios, scripts, or procedures.
The Contractor shall document test procedures to ensure replicability and compliance with standards.
The Contractor shall develop and define characteristics of quality including quality metrics and scoring parameters and determine requisite quality control resources.
The Contractor shall develop or specify standards, methods, or procedures to determine product quality or release readiness.
The Contractor shall document software defects, using a bug tracking system, and report defects to software developers.
The Contractor shall evaluate or recommend software for testing or bug tracking.
The Contractor shall identify program deviance from standards and suggest modifications to ensure compliance.
The Contractor shall identify, analyze, and document problems with program function, output, online screen, or content.
The Contractor shall install and configure recreations of software production environments to allow testing of software performance.
The Contractor shall install, maintain, or use software testing programs.
The Contractor shall monitor bug resolution efforts and track successes.
The Contractor shall monitor program performance to ensure efficient and problem-free operations.
The Contractor shall participate in formal and informal reviews to determine quality.
The Contractor shall participate in product design reviews to provide input on functional requirements, product designs, schedules, or potential problems.
The Contractor shall perform initial debugging procedures by reviewing configuration files, logs, or code pieces to determine breakdown source.
The Contractor shall plan test schedules or strategies in accordance with project scope or delivery dates.
The Contractor shall provide feedback and recommendations to developers on software usability and functionality.
The Contractor shall provide technical support during software installation or configuration.
The Contractor shall review software documentation to ensure technical accuracy, compliance, or completeness, or to mitigate risks.
The Contractor shall test system modifications to prepare for implementation.
The Contractor shall update automated test scripts.
The Contractor shall utilize beta testing sites to evaluate software performance.
Requirements
Basic Qualifications:
Candidate must have an active TS/SCI with a Full Scope Polygraph
Requires Bachelors with 12-15 years of prior relevant experience or Masters with 10-13 years of prior relevant experience. Additional years of experience can be accepted in lieu of a degree.
Demonstrated experience performing hands-on forensic review of devices to include laptops and mobile devices, using open source or commercial forensic tools, such as EnCase, FTK, X-Ways, Magnet IEF, or BlackLight.
Demonstrated experience handling and imaging various types of evidence from Solid State Drives (SSD), Hard Disk Drives (HDD), Thumb Drives, Volatile Memory, or Compact Disks.
Demonstrated experience with data extraction and analysis from various data sources including files, logs, directories, unallocated space, raw images, and custom databases.
Demonstrated experience parsing data types necessary to extract metadata and content of forensic value from various data sources.
Demonstrated experience and in depth understanding of multiple operating systems such as Windows, Linux, iOS, and Android.
Demonstrated experience performing hands-on forensic review or reverse engineering of modern mobile devices such as Google Android or Apple iOS.
Demonstrated experience working with virtualization software and virtualized environments to include ESXi, VMWare, or VirtualBox.
Demonstrated experience conducting analysis of identified malicious software or code using both static and dynamic malware analysis.
Demonstrated experience using debuggers and disassemblers such as OllyDbg, WinDbg, IDA Pro, or Binary Ninja.
Demonstrated experience understanding system kernel level processing to detect and report on significant kernel events such as root kits, hooked functions, call tables, and data structures.
Desired Qualifications:
Demonstrated experience using programming skills using scripting languages such as Perl, Python, or Bash.
Demonstrated experience with Sponsors enterprise and operational activities, capabilities, technical development programs.
Demonstrated experience with Sponsors information cyber security policies and regulations.
Demonstrated experience with risk management standards, Committee on National Security Systems Publication (CNSSP) 1253, Federal Information Processing Standards (FIPS) 140-2, 199, 200, and National Institute of Standards and Technology (NIST) Special Publication 800-37, 800-39, 800-53.