Software Developer

Fort Belvoir, Virginia

Quantum Research International, Inc.
Apply for this Job
Job Description Overview : Quantum Research International, Inc. (Quantum) is a certified DoD Contractor providing services and products to US/Alliedgovernments and industry in the following main areas: (1) Cybersecurity, High Performance Computing Systems, Cloud Services and Systems; (2) Space and Ground Support Systems; (3) Aviation Systems; (4) Missile Systems; (5) Artificial Intelligence/ Machine Learning Systems and Experimentation/Training; and (6) Audio Visual Systems and Services. Quantum's Corporate Office is in Huntsville, AL, but Quantum actively hires for positions nationwide and internationally. We pride ourselves on providing high quality support to the U.S. Government and our Nation's Warfighters. In addition to our corporate office, we have physical locations in Aberdeen; MD; Colorado Springs, CO; Orlando, FL; Crestview, FL; and Tupelo, MS. Mission: Quantum Research Intl is seeking a Senior level Software Developer. As a member of the NGA Defender team, the contractor will develop, test, and maintain Machine Learning software and computer applications to improve and optimize cybersecurity across the agency. This position is available immediately at NGA Campus East (NCE) in Springfield, VA. Responsibilities: Ideal candidate: develops, creates, maintains, and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs. Specific responsibilities include: Analyze information to determine, recommend, and plan the development of a new application or modification of an existing application, and analyze user needs and software requirements to determine feasibility of design within time and cost constraints.
Apply coding and testing standards, apply security testing tools including "'fuzzing" static-analysis code scanning tools, apply secure code documentation, and conduct code reviews.
Capture security controls used during the requirements phase to integrate security within the process, to identify key security objectives, and to maximize software security while minimizing disruption to plans and schedules.
Compile and write documentation of program development and subsequent revisions, inserting comments in the coded instructions so others can understand the program.
Confer with systems analysts, engineers, programmers, and others to design application and to obtain information on project limitations and capabilities, performance requirements, and interfaces.
Correct errors by making appropriate changes and rechecking the program to ensure that desired results are produced.
Design, develop, and modify software systems, using scientific analysis and mathematical models to predict and measure outcome and consequences of design.
Develop secure code and error handling.
Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration.
Identify basic common coding flaws at a high level and security implications and apply methodologies within centralized and decentralized environments across the enterprise's computer systems in software development.
Identify security issues around steady state operation and management of software and incorporate security measures that must be taken when a product reaches its end of life.
Perform integrated quality assurance testing for security functionality and resiliency attack.
Perform secure programming and identify potential flaws in codes to mitigate vulnerabilities.
Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change.
Prepare detailed workflow charts, diagrams, and dashboards that describe input, output, and logical operation, and convert them into a series of instructions coded in a computer language.
Address security implications in the software acceptance phase including completion criteria, risk acceptance and documentation, common criteria, and methods of independent testing.
Identify and leverage the enterprise-wide version control system while designing and developing secure applications.
Conduct trial runs of programs and software applications to ensure that the desired information is produced, and instructions and security levels are correct. Requirements: TS/SCI eligible, subject to CI Polygraph
IAT Level 3 (or better a plus)
Bachelor's degree. In lieu of degree, CISSP-ISSAP may be accepted.6 years exp or more
Strong background in Python.
Ability to tailor code analysis for application-specific concerns.
Ability to develop secure software according to secure software deployment methodologies, tools, and practices.
Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
Knowledge of cybersecurity and privacy principles, cyber threats and vulnerabilities, and the specific operational impacts of cybersecurity lapses.
Understands complex data structures and computer programming principles.
Knowledge of cybersecurity and privacy principles and methods that apply to software development.
Understands secure configuration management techniques, software debugging principles, software design tools, methods, and techniques, and software development methodologies (e.g., Agile, DevOps, etc). Desired/Preferred Skills: Experience with Machine Learning projects and Natural Language Processing. Create programs that validate and process multiple inputs including command line arguments, environmental variables, and input streams. Design secure test plans (e. g. unit, integration, system, acceptance). Conduct code analysis and perform root cause analysis. Develop secure software according to secure software deployment methodologies, tools, and practices . , Equal Opportunity Employer/Affirmative Action Employer M/F/D/V: All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, disability, veteran status, genetic information, sexual orientation, gender identity, or any other characteristic protected by law. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Date Posted: 08 May 2025
Apply for this Job