M
On-site
Stafford, Virginia, United States



Primary Responsibilities:

  • The Contractor shall provide support for designing, engineering, implementing, and maintaining enterprise quality systems, networks, and applications for Cyber related investigations across the Sponsors initiatives.
  • The Contractor shall assist the Sponsor in the evaluation of software and associated documentation.
  • The Contractor shall collaborate with customers to evaluate or diagnose problems and recommend possible solutions.
  • The Contractor shall conduct historical analyses of test results.
  • The Contractor shall conduct software compatibility tests with programs, hardware, operating systems, or network environments.
  • The Contractor shall coordinate user or third party testing.
  • The Contractor shall create or maintain databases of known test defects.
  • The Contractor shall develop testing programs that address areas such as database impacts, software scenarios, regression testing, negative testing, error or bug retests, or usability.
  • The Contractor shall design or develop automated testing tools.
  • The Contractor shall design test plans, scenarios, scripts, or procedures.
  • The Contractor shall document test procedures to ensure replicability and compliance with standards.
  • The Contractor shall develop and define characteristics of quality including quality metrics and scoring parameters and determine requisite quality control resources.
  • The Contractor shall develop or specify standards, methods, or procedures to determine product quality or release readiness.
  • The Contractor shall document software defects, using a bug tracking system, and report defects to software developers.
  • The Contractor shall evaluate or recommend software for testing or bug tracking.
  • The Contractor shall identify program deviance from standards and suggest modifications to ensure compliance.
  • The Contractor shall identify, analyze, and document problems with program function, output, online screen, or content.
  • The Contractor shall install and configure recreations of software production environments to allow testing of software performance.
  • The Contractor shall install, maintain, or use software testing programs.
  • The Contractor shall monitor bug resolution efforts and track successes.
  • The Contractor shall monitor program performance to ensure efficient and problem-free operations.
  • The Contractor shall participate in formal and informal reviews to determine quality.
  • The Contractor shall participate in product design reviews to provide input on functional requirements, product designs, schedules, or potential problems.
  • The Contractor shall perform initial debugging procedures by reviewing configuration files, logs, or code pieces to determine breakdown source.
  • The Contractor shall plan test schedules or strategies in accordance with project scope or delivery dates.
  • The Contractor shall provide feedback and recommendations to developers on software usability and functionality.
  • The Contractor shall provide technical support during software installation or configuration.
  • The Contractor shall review software documentation to ensure technical accuracy, compliance, or completeness, or to mitigate risks.
  • The Contractor shall test system modifications to prepare for implementation.
  • The Contractor shall update automated test scripts.
  • The Contractor shall utilize beta testing sites to evaluate software performance.



Requirements


Basic Qualifications:

  • Candidate must have an active TS/SCI with a Full Scope Polygraph
  • Requires Bachelors with 12-15 years of prior relevant experience or Masters with 10-13 years of prior relevant experience. Additional years of experience can be accepted in lieu of a degree.
  • Demonstrated experience performing hands-on forensic review of devices to include laptops and mobile devices, using open source or commercial forensic tools, such as EnCase, FTK, X-Ways, Magnet IEF, or BlackLight.
  • Demonstrated experience handling and imaging various types of evidence from Solid State Drives (SSD), Hard Disk Drives (HDD), Thumb Drives, Volatile Memory, or Compact Disks.
  • Demonstrated experience with data extraction and analysis from various data sources including files, logs, directories, unallocated space, raw images, and custom databases.
  • Demonstrated experience parsing data types necessary to extract metadata and content of forensic value from various data sources.
  • Demonstrated experience and in depth understanding of multiple operating systems such as Windows, Linux, iOS, and Android.
  • Demonstrated experience performing hands-on forensic review or reverse engineering of modern mobile devices such as Google Android or Apple iOS.
  • Demonstrated experience working with virtualization software and virtualized environments to include ESXi, VMWare, or VirtualBox.
  • Demonstrated experience conducting analysis of identified malicious software or code using both static and dynamic malware analysis.
  • Demonstrated experience using debuggers and disassemblers such as OllyDbg, WinDbg, IDA Pro, or Binary Ninja.
  • Demonstrated experience understanding system kernel level processing to detect and report on significant kernel events such as root kits, hooked functions, call tables, and data structures.

Desired Qualifications:

  • Demonstrated experience using programming skills using scripting languages such as Perl, Python, or Bash.
  • Demonstrated experience with Sponsors enterprise and operational activities, capabilities, technical development programs.
  • Demonstrated experience with Sponsors information cyber security policies and regulations.
  • Demonstrated experience with risk management standards, Committee on National Security Systems Publication (CNSSP) 1253, Federal Information Processing Standards (FIPS) 140-2, 199, 200, and National Institute of Standards and Technology (NIST) Special Publication 800-37, 800-39, 800-53.