Key competencies and qualifications for a well-rounded Software Evaluator/Engineer with a cybersecurity focus.
- Proficiency in C and C++ for low-level system programming and cryptographic algorithm implementation.
- Expertise in Python for automation and scripting.
- Experience with Java to design, create, test, and maintain software applications.
- Knowledge of Rust and development of secure, memory-safe applications.
- Experience with Linux-based operating systems, including system configuration, scripting, and secure development.
- Deep understanding of cryptographic principles, including:
- Symmetric and asymmetric encryption algorithms (e.g., AES, RSA, ECC).
- Knowledge of various cryptographic modes, including their strengths and weaknesses.
- Integrating cryptographic modes into software applications using cryptography libraries, ensuring correct usage and parameterization.
- Background with cryptographic concepts including block ciphers and key management.
- Experience with encryptors, secure communications, and cryptographic product evaluation.
- Experience with front-end development and secure web interfaces.
- Familiarity with static and dynamic code analysis tools.
- Understanding of network protocols and security concepts, including; TCP/IP, SSL/TLS, and RESTCONF/YANG.
- Ability to design and evaluate secure network communications.
- Conduct risk assessments, security audits, and vulnerability assessments on systems and applications.
- Ensure systems comply with applicable DoD, IC, and other regulatory requirements.
Requirements needed to qualify for the role:
- Experience in secure coding practices, vulnerability mitigation, and secure software lifecycle management.
- Ability to evaluate cryptographic implementations for correctness, security, and performance.
- Understanding of FIPS 140-3, Common Criteria, and other cryptographic certification processes.
- Experience with Linux operating systems, particularly:
- Administration, configuration, and scripting in Linux environments.
- Key management, hashing, and digital signatures.
- Effective collaboration in cross-functional teams.
- Strong written and verbal communication skills to document software designs and technical specifications.
Preferred Qualifications:
- Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or equivalent.
- Certifications related to cryptographic technologies or Linux systems, such as Linux+ or RHCE.
Optimus Technology is a SDVO (Service-Disabled Veteran-Owned) small business founded in 2010. We are known for our exceptionally talented group of Engineers and Technical experts with superior knowledge and experience in Cyber Technologies and the latest technology trends. Our dedication in pairing the right Optimus Technologist with the right customer solution is at the core of our Partnership commitment and critical to the performance and satisfaction of our employees, the pinnacle of the Optimus culture.
Why us?
We strive to provide the best well-rounded benefits package available.
- Premium health, dental, and vision package
- Company funded HRA
- 401k company contributions
- Employer paid group term life insurance policy
- Tuition assistance and career development
- Short-term and long-term disability
- Paid time off
- Referral bonuses
- Company outings, giveaways & more
Optimus practices a policy of non-discrimination and is fully committed to the principles of equality in employment and opportunity for all employees. Employment decisions are made without regard to age, gender, race, religion, marital status, national origin, sexual orientation, or any other non-merit based factor.