×
Register Here to Apply for Jobs or Post Jobs. X

Cyber Capability Developer - CNO​/CNE Developer III

Job in Chantilly, Fairfax County, Virginia, 22021, USA
Listing for: Noblis
Full Time position
Listed on 2026-01-02
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer
Job Description & How to Apply Below

Responsibilities

As a Cyber Developer, you will research, develop, and execute specialized operational and analytic capabilities to support technical operations in solving unique challenges posed by criminal and national security actors. You will build advanced tools and capabilities for tactical teams performing incident response and computer network operations and exploitation (CNO/CNE). This role requires expertise in both offensive and defensive cyber security tools, network topologies, and secured networks to deliver innovative solutions for mission‑critical operations.

The scope of this effort involves software engineering and development at both the user and kernel levels; configuring and managing complex network environments; management of covert and virtualized systems; vulnerability research and analysis; and use of open‑source penetration testing tools.

Key Responsibilities
  • Build and test operational prototypes for tactical teams responding to sophisticated cyber threats
  • Conduct analysis of case and intelligence related cyber data to develop advanced analytical tools
  • Configure and manage complex routing and switching fabrics with significant segmentation, including managed attribution of individual network paths
  • Set up and maintain firewall, VPN, proxy, and tunnel configurations for secure operations
  • Implement and manage data ingest pipelines through network diodes for secure data transfer
  • Administer high availability virtualized environments with complex networking configurations
  • Perform research of novel capabilities derived from technical analysis
  • Research emerging technologies, exploitation techniques, and custom tools
  • Perform reverse engineering of cyber actor tools and techniques to advance defenses
  • Conduct vulnerability research against host endpoints and service targets
  • Implement secure development practices for sensitive operational tools
  • Create and manage CI/CD pipelines and git version control systems for rapid deployment
  • Support systems integration for operations
Required Qualifications
  • Active Top Secret (TS) clearance with eligibility for Sensitive Compartmented Information (SCI) and ability to obtain a Counterintelligence (CI) Polygraph
  • US Citizenship is required
  • Bachelor's degree or master's degree with 8 years of experience OR Associate degree with 11 years of experience OR High School/Diploma with 14 years of experience
  • Solid understanding of forensic and investigative data requirements
  • Demonstrated experience designing and implementing software solutions in secure government environments
  • Proficiency Level:
  • Advanced programming with focus on rapid software prototyping
  • Exploit development and sophisticated vulnerability research
  • Advanced network analysis and protocol manipulation for attribution management
  • Tool development for specialized cyber operations and cyber effects
  • Custom data processing and analytics pipelines through secure channels
  • Secure coding practices for operational tools in classified environments
  • Advanced endpoint detection and response application development
  • Development of sophisticated detection avoidance techniques
Desired Qualifications
  • Active TS/SCI with CI Polygraph
  • Bachelor's degree in Computer Science, Engineering, or related field
  • Additional Technical Experience – Experience with:
  • Mixed vendor/platform environments, including COTS, GOTS, and custom developed tools
  • Digital forensics tools and techniques for complex investigations
  • Memory analysis and disk forensics in adversarial environments
  • Threat intelligence platforms and integration
  • Encryption and obfuscation techniques for secure communications
  • Incident response methodologies in high‑stakes environments
  • Participation in capture the flag exercises, bug bounty programs, and security conferences
  • Advanced application of risk assessment methodologies
  • Complex malware analysis, digital forensics, and software reverse engineering
  • Management of high‑security virtualized environments
Overview

Noblis (http://(Use the "Apply for this Job" box below).) and our wholly owned subsidiaries, Noblis ESI, and Noblis MSD tackle the nation’s toughest problems and apply advanced solutions to our clients’ most critical missions. We bring the best of scientific thought,…

To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary