Research And Development Specialist/Cyber

Independence, Missouri

Quantum Research International, Inc.
Apply for this Job
Job Description Overview: Quantum Research International, Inc. (Quantum ) is a certified DoD Contractor providing services and products to US/Allied governments and industry in the following main areas: (1) Cybersecurity, High Performance Computing Systems, Cloud Services and Systems; (2) Space and Ground Support Systems; (3) Aviation Systems; (4) Missile Systems; (5) Artificial Intelligence/ Machine Learning Systems and Experimentation/Training; and (6) Audio Visual Systems and Services. Quantum's Corporate Office is in Huntsville, AL, but Quantum actively hires for positions nationwide and internationally. We pride ourselves on providing high quality support to the U.S. Government and our Nation's Warfighters. In addition to our corporate office, we have physical locations in Aberdeen; MD; Colorado Springs, CO; Orlando, FL; Crestview, FL; Madison, AL, and Tupelo, MS. Mission: As a member of the NGA DEFENDER team, the Research & Development Specialist willsupport cybersecurity integration efforts across NGA. As part of the work, the contractor uses Cybersecurity Business Intelligence (CBI) tools to analyze CBI data and develop work products; supports cybersecurity policy evolution; assists with the analysis and management of cybersecurity compliance and reporting requirements; and takes action to support information sharing across NGA. This position is available immediately and supports the National Geospatial-Intelligence Agency (NGA) onsite at NGA Campus West in St. Louis, Missouri. Responsibilities: The Research & Development Specialist conducts software and systems engineering and software systems research to develop new capabilities, ensuring cybersecurity is fully integrated, and conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems. Specific responsibilities include: Review and validate data mining and data warehousing programs, processes, and requirements. Research current technology to understand capabilities of required system or network. Identify cyber capabilities strategies for custom hardware and software development based on mission requirements. Collaborate with stakeholders to identify and/or develop appropriate solutions technology. Design and develop new tools/technologies as related to cybersecurity. Evaluate network infrastructure vulnerabilities to enhance capabilities being developed. Follow software and systems engineering life cycle standards and processes. Troubleshoot prototype design and process issues throughout the product design, development, and pre-launch phases. Identify functional- and security-related features to find opportunities for new capability development to exploit or mitigate vulnerabilities. Identify and/or develop reverse engineering tools to enhance capabilities and detect vulnerabilities. Develop data management capabilities (e.g., cloud-based, centralized cryptographic key management) to include support to the mobile workforce. Research and evaluate available technologies and standards to meet customer requirements. Requirements: Bachelor's degree in Computer Science or Information Systems or other technically relevant degree. Understands computer networking concepts and protocols, network security methodologies, and risk management processes (e.g., methods for assessing and mitigating risk). Expertise with laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. Knowledge of cybersecurity and privacy principles, cyber threats and vulnerabilities, and the specific operational impacts of cybersecurity lapses. Familiar with new and emerging information technology (IT) and cybersecurity technologies, and information technology (IT) supply chain security and supply chain risk management policies, requirements, and procedures. Understands hardware reverse engineering techniques and middleware (e.g., enterprise service bus and message queuing), and networking protocols, software reverse engineering techniques, and Extensible Markup Language (XML) schemas. Familiar with covert communication techniques, forensic footprint identification, mobile communications architectures, and operating system structures and internals (e.g., process management, directory structure, installed applications). Understands the capabilities, applications, and potential vulnerabilities of network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware. Familiar with hacking methodologies, and industry technologies' potential cybersecurity vulnerabilities Secruity clearance: TS/SCI eligible, subject to CI Polygraph. IAT Level 2 certs Desired/Preferred Skills Apply and incorporate information technologies into proposed solutions. Create and utilize mathematical or statistical models and scientific rules and methods to solve problems. Apply the systems engineering process and design the integration of technology processes and solutions, including legacy systems and modern programming languages. Identify systemic security issues based on the analysis of vulnerability and configuration data. Prepare and present briefings and produce technical documentation. Identify critical infrastructure systems with information communication technology that were designed without system security considerations. Communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. Equal Opportunity Employer/Affirmative Action Employer M/F/D/V: All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, disability, veteran status, genetic information, sexual orientation, gender identity, or any other characteristic protected by law. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. of Hires Needed 1
Date Posted: 20 April 2024
Apply for this Job