Software Developer - Advanced

Software Developer - Advanced

Contract Type:

Contractor

Location:

Industry:

Securely Provision (SP)

Contact Name:

Nicole Brown

Contact Email:

nicole.brown@c-ents.com

Contact Phone

12024213166

Published

30-Jan-2025

Job Overview:
As a Software Developer, you will be a key contributor to our software development team, playing a vital role in designing, coding, testing, and maintaining high-quality software solutions. The Software Developer will work collaboratively with cross-functional teams to analyze user requirements, create technical specifications, and deliver software products that meet or exceed client expectations. This role requires a strong foundation in programming, problem-solving skills, and a passion for creating efficient and scalable software solutions.
 
Job Functional Titles:
Personnel performing this work role may also be referred to officially or unofficially as the following functional titles:

  • Analyst Programmer
  • Computer Programmer
  • Database Developer/Engineer/Architect
  • Information Assurance (IA) Software Developer
  • Information Assurance (IA) Software Engineer
  • Research & Development Engineer
  • Secure Software Engineer
  • Security Engineer
  • Software Developer
  • Software Engineer/Architect
  • Web Application Developer
  • Cloud Developer
  • Mainframe Developer
  • Full Stack Developer
  • DevOps Engineers
  • Java Developers
  • .NET Developers
Recommended Certifications  (Hold one or more certifications) :
  • CompTIA Advanced Security Practitioner (CASP+) 
  • ISACA Certified Information Systems Auditor (CISA)
  • ISC2  Certified Cloud Security Professional (CCSP)
  • ISC2 Certified Information Systems Security Professional (CISSP)
  • ISC2 CISSP - ISSAP
  • GIAC Certified Enterprise Defender (GCED)
  • Global Information Assurance Incident Handler (GCIH)
  • Cisco Certified Network Professional Security (CCNP Security)
Education:
A Bachelor's or Master's degree in a relevant field is often required.
 
Experience:
7+ years of experience. Candidates are expected to have a more advanced skill set and practical experience.
 
Management/Leadership Roles:
  • 10+ years of professional experience.
  • Involves managerial or leadership responsibilities, overseeing cybersecurity teams, and shaping organizational security policies.
Candidates will have an advance understanding and exposure to the following core career elements:
 
Core Tasks
  • Analyze information to determine, recommend, and plan the development of a new application or modification of an existing application. (T0009)
  • Analyze user needs and software requirements to determine feasibility of design within time and cost constraints. (T0011)
  • Apply coding and testing standards, apply security testing tools including "'fuzzing" static-analysis code scanning tools, and conduct code reviews. (T0013)
  • Apply cybersecurity functions (e.g., encryption, access control, and identity management) to reduce exploitation opportunities. (T0553)
  • Apply secure code documentation. (T0014)
  • Capture security controls used during the requirements phase to integrate security within the process, to identify key security objectives, and to maximize software security while minimizing disruption to plans and schedules. (T0022)
  • Compile and write documentation of program development and subsequent revisions, inserting comments in the coded instructions so others can understand the program. (T0026)
  • Conduct trial runs of programs and software applications to ensure the desired information is produced and instructions and security levels are correct. (T0436)
  • Confer with systems analysts, engineers, programmers, and others to design application and to obtain information on project limitations and capabilities, performance requirements, and interfaces. (T0034)
  • Consult with engineering staff to evaluate interface between hardware and software. (T0040)
  • Correct errors by making appropriate changes and rechecking the program to ensure desired results are produced. (T0046)
  • Design, develop, and modify software systems, using scientific analysis and mathematical models to predict and measure outcome and consequences of design. (T0057)
  • Determine and document software patches or the extent of releases that would leave software vulnerable. (T0554)
  • Develop secure code and error handling. (T0077)
  • Develop software system testing and validation procedures, programming, and documentation. (T0455)
  • Enable applications with public keying by leveraging existing public key infrastructure (PKI) libraries and incorporating certificate management and encryption functionalities when appropriate. (T0416)
Core Competencies
  • Computer Languages
  • Data Privacy and Protection
  • Identity Management
  • Incident Management
  • Information Assurance
  • Information Systems/Network Security
  • Risk Management
  • Software Development
  • Software Testing and Evaluation
  • System Administration
  • Systems Integration
  • Systems Testing and Evaluation
  • Threat Analysis
  • Vulnerabilities Assessment
  • Web Technology
Core Knowledge
  • Knowledge of computer programming principles (K0016)
  • Knowledge of organization's evaluation and validation requirements. (K0028)
  • Knowledge of cybersecurity and privacy principles and methods that apply to software development. (K0039)
  • Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). (K0044)
  • Knowledge of low-level computer languages (e.g., assembly languages). (K0051)
  • Knowledge of programming language structures and logic. (K0068)
  • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). (K0070)
  • Knowledge of secure configuration management techniques. (e.g., Security Technical Implementation Guides (STIGs), cybersecurity best practices on cisecurity.org). (K0073)
  • Knowledge of software debugging principles. (K0079)
  • Knowledge of software design tools, methods, and techniques. (K0080)
  • Knowledge of software development models (e.g., Waterfall Model, Spiral Model). (K0081)
  • Knowledge of software engineering. (K0082)
  • Knowledge of structured analysis principles and methods. (K0084)
  • Knowledge of system design tools, methods, and techniques, including automated systems analysis and design tools. (K0086)
  • Knowledge of web services (e.g., service-oriented architecture, Simple Object Access Protocol, and web service description language). (K0105)
  • Knowledge of interpreted and compiled computer languages. (K0139)
  • Knowledge of secure coding techniques. (K0140)
  • Knowledge of software related information technology (IT) security principles and methods (e.g., modularization, layering, abstraction, data hiding, simplicity/minimization). (K0152)
  • Knowledge of software quality assurance process. (K0153)
  • Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). (K0179)
  • Knowledge of Personally Identifiable Information (PII) data security standards. (K0260)
  • Knowledge of information technology (IT) risk management policies, requirements, and procedures. (K0263)
  • Knowledge of root cause analysis techniques. (K0343)
  • Skill in conducting software debugging. (S0014)
  • Skill in creating programs that validate and process multiple inputs including command line arguments, environmental variables, and input streams. (S0019)
  • Skill in designing countermeasures to identified security risks. (S0022)
  • Skill in developing and applying security system access controls. (S0031)
  • Skill in developing applications that can log and handle errors, exceptions, and application faults and logging. (S0149)
  • Ability to develop secure software according to secure software deployment methodologies, tools, and practices. (A0047)

Apply Now
Apply Now
Interested in this job?
Save Job

Share this Job

Create As Alert

Similar Jobs

Read More
SCHEMA MARKUP ( This text will only show on the editor. )