What are the responsibilities and job description for the Cyber Battle Lab: Senior Computer Programmer/Software Engineer M&S position at MKS2 Technologies?
Cyber Battle Lab: Senior Computer Programmer/Software Engineer M&S
MKS2 is looking for a Computer Programmer/Software Engineer M&S for the Cyber Battle Lab (CBL) program. The mission of the CBL is to provide overall direction, oversight, vertical and horizontal integration of CO, DODIN-A, and EW activities focused on the development of a Multi-Domain Operations (MDO) Force (2028 – 2035) for the Army as defined by the Army Modernization Strategy (AMS), guided by the Annual Mission Guidance (AMG), and sanctioned by the AFC.
The role is contingent upon award and will be located at Fort Gordon, Georgia.
Required Qualifications:
- Hold an active Secret clearance.
- At day one, possess an IAT Level I certification.
- Verification of training, certification or at least 5 years hands-on-experience in utilizing the following software applications and simulation environments:
- Delphi, EXata, QUALNET, Joint Network Emulator (JNE), OneSAF, C and C, MS Visual Studio, Visual Basic, SQL Server 2014 and all previous versions, Transact SQL, Rational Purify, Perl, Systems Tool Kit (STK), Active Directory, DNS, DHCP, Mail Server, Print Server, LDAP, Kerberos, Systems Planning, Engineering, and Evaluation Device (SPEED), Microsoft SharePoint, CO Enhanced Network and Training Simulators (CENTS) and the Naval Research Laboratories Builder model.
- Certification & Training, CE, within 6 months: (1) for Windows: pass MS Exam 70‐411 "Administering Windows Server 2012"; or complete Windows training approved by the IAM/COR; and (2) for Linux: Linux CE certification; or Linux training approved by the IAM/COR.
- Minimum of five (5) years’ of hands on experience in:
- TCP/IP, Ethernet, wireless transmission devices, network security, ethical hacking, network and computer system fundamentals, cryptography, foot printing, scanning, enumeration, system hacking, malware, sniffers, social engineering, denial of service, session hijacking, web servers and applications, SQL injection, hacking Wi-Fi and Bluetooth, mobile device security, evasion, cloud technologies and security, and penetration testing frameworks; and advanced experience dissecting and analyzing: HTML, JavaScript, C, C , Java, Python, PHP, ASP, NETMySQL, VirtualBox, and VMware.
- Proficiencies: possess the knowledge, skills and abilities to build an emulation environment to conduct ethical hacking using IP Schemas, the OSI Model, LANs/WANs, switch, router, firewall, access point, SNMP, ARP, NAT, HTTP, FTP, Telnet, RDP, SSH, POP, SMTP, SSL, and NetBIOS.
Must be an effective communicator both verbally and in writing. Most positions require ability to work on a desktop or laptop computer for extended periods of time. Computer activities include reading, reviewing and analyzing information, as well as providing recommendations, summaries, and reports in written or verbal format. Additionally, positions require ability to sit at a workstation for extended periods; use hand(s) to handle or feel objects, tools, or controls; reach with hands and arms; as well as speak and hear.
Employee may be required to occasionally lift and/or move moderate amounts of weight, typically less than 20 pounds. Regular and predictable attendance is essential.