What are the responsibilities and job description for the Application Developer position at Secured?
Job Description
PLEASE NOTE : This position requires an ACTIVE Top Secret / SCI Clearance with Polygraph. To be considered for this position, you MUST have an ACTIVE Clearance Level of Top Secret / SCI with Polygraph
Summary
The successful candidate will be dedicated full-time to development and enhancement support for existing applications as well as new development.
Duties, Tasks & Responsibilities :
- Designing, programming / developing, and modifying software systems, applications, and tools, both existing and potentially new in the future
- Analyzing user needs and software requirements to determine feasibility of design within time and cost constraints
- Collaborating with teammates, other service providers, vendors, and users to develop new program features
- Developing unit and integration tests, in addition to participating in functional and regression tests to ensure programs will produce the desired results and that instructions are correct
- Correcting errors by making the appropriate changes and then re-checking the program to ensure the desired result was produced
- Participating in code reviews by reviewing and incorporating feedback from teammates as well as providing feedback to others based on existing standards and recommended programming practices
- Deploying code to development, test, and production environments using existing DevOps infrastructure / tools
- Reviewing help desk messages periodically and working with other teams to troubleshoot and resolve production issues
- Organizing and maintaining documentation of application development and subsequent revisions, so others are able to understand the program
Required Skills
Required Experience, Skills, & Technologies
Desired Skills
Desired Experience, Skills & Technologies
About Secured
Today, Secured™ is one of the only cybersecurity and technology firms capable of applying over 20 years of experience in classified cyber operations to privacy and security solutions for the masses. New and different vulnerabilities are born every day, and we lean on our experience to find the best solution.