CNO Automation/Testing Engineer, Senior; TS/SCI
Listed on 2026-02-16
-
IT/Tech
Cybersecurity, IT Consultant
Job Description
Parsons is seeking an experienced Software Developer with Dev Sec Ops and docs‑as‑code experience to join our team in support of specialized military cyber operations. You’ll be a critical member of a small team, responsible for bringing your high‑level software development capability to bear on a critical national security mission. In this role you will conduct offensive capability development and assessment for Windows and Linux environments, Dev Sec Ops , reverse engineering, and vulnerability research with a focus on OCO (Offensive Cyber Operations) and DCO (Defensive Cyber Operations) assessment activities.
This offers a unique opportunity to contribute to the security and effectiveness of our operations by leveraging advanced cybersecurity analysis techniques to enhance our cyber situational awareness and capabilities.
- Architect, coordinate and support cyberspace capability development efforts to rapidly deliver joint operational products through integrated project delivery, enabling full‑spectr um cyberspace operations.
- Perform software engineering, analysis and vulnerability research with a focus on OCO (Offensive Cyber Operations) and DCO (Defensive Cyber Operations) activities.
- Perform representative capability testing to assess tool functionality and employment considerations prior to operational deployment.
- Develop and automate unit, integration, and end‑to‑end tests, and provide capability testing reports.
- Perform test and evaluation of procured and developed cyber capabilities to ensure effective operational evaluation and acceptance for critical operations.
- Identify potential software weaknesses/vulnerabilities.
- Conduct thorough static and dynamic analyses of capabilities, including network traffic and PCAP data to identify potential security threats and vulnerabilities.
- Research highly technical subject matter, organize information from multiple sources, and express technical information in written form that is comprehensible to a wide audience of readers.
- Automation (docs‑as‑code), preparation, review, revision, and maintenance of technical documents including software and systems engineering, system operations, testing, and user documentation.
- Work with customers directly, performing full cycle system engineering, gathering requirements and source code, to technical documentation and specifications.
- Interact with various stakeholders and team members to provide detailed reports and recommendations.
- Active TS/SCI w/ poly
- Bachelor's degree or related job experiences in a related field (Computer Science, Cybersecurity, Computer Engineering, etc.).
- 8+ years of experience in cybersecurity analyst, with a strong background in identifying and mitigating vulnerabilities.
- Minimum 5 years utilizing programming/scripting languages such as Python, Bash, Power Shell, Ruby.
- Extensive experience in virtual test environment design, including familiarity configuring and deploying common operating systems and network flows, hypervisors and containers.
- Extensive experience in Dev Sec Ops , implementing Linting, testing, docs‑as‑code and releases via Git Lab pipelines.
- Ability to effectively assess and automate assessment of software functionality and collect forensic artifacts via custom and industry standard tools on common platforms.
- Must be proficient in offensive capability development and assessment for Windows and Linux environments.
- Experience working in an agile/scrum environment.
- Master's degree in a related field (Computer Science, Cybersecurity, Computer Engineering, etc.).
- 12+ years of experience in cybersecurity analyst, with a strong background in identifying and mitigating vulnerabilities.
- Building and designing applications in Python.
- Knowledge of Windows and Linux Internals and APIs, Vulnerability Analysis or Kernel / system level programming.
- Host‑based computer forensics, network‑based forensics, intrusion detection/analysis, software vulnerability research, recommending countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities, cyber…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).