Help keep DOD systems and personnel safe from Cybersecurity threats.
Design, develop, document, test and debug applications software and systems that contain logical and mathematical solutions.
Conduct multidisciplinary research and collaborate with equipment designers and/or hardware engineers in the planning, design, development, and utilization of electronic data processing systems for product and commercial software.
Determine computer user needs
Analyze system capabilities to resolve problems on program intent, output requirements, input data acquisition, programming techniques and controls
Prepare operating instructions
Ensure software standards are met.
Provide engineering support for technical implementation of cyber solutions in conjunction with hardware product development, for medical, industrial, military, communications, aerospace, and scientific applications, applying principles and techniques of computer science, engineering, and mathematical analysis.
Conduct vulnerability research, penetration testing, malware analysis and reverse engineering development of computer network operations tools.
Perform technical verification and validation of tactical requirements, evaluate, and recommends alternative solutions.
Perform analysis of the system product to include: requirements definition, system design, testing, operation, and maintenance.
Ensure the logical and systematic conversion of product requirements into total systems solutions that acknowledge technical and schedule constraints.
More About the Role:
Plan Cybersecurity architectures, strategies, requirements, and implementations for DOD systems.
Evaluate systems after implementation and integration.Prove that they satisfy Cybersecurity requirements.
Manage incoming data about vulnerabilities in COTS products and advise customers how new information affects their Cybersecurity posture and exposure.
Work with other communities to ensure user training and documentation reflects improvements in Cybersecurity defenses.
Travel approximately once a month to perform evaluations at DOD facilities.
You’ll Bring These Qualifications:
BS in Cybersecurity
BS or equivalent in an Engineering discipline
These Qualifications Would be Nice to Have:
Secret clearance or eligible for Secret (U.S. Citizen).
Microsoft Office (MS Word, Excel, PowerPoint) required
Knowledge of Linux Operating Systems preferred.
Cybersecurity certifications (such as Security+) highly desired.
Knowledge of Virtual Machines (VM) and VM capabilities highly desired
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 55 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.