Build the Tools Behind the Mission: Join us as a CNO Software Engineer!
Don't just write code—build the capabilities that power Computer Network Operations. Supporting the DoD and Intelligence Community, you'll work alongside Red, Blue, and Hunt teams to develop, enhance, and sustain tools used to detect, analyze, and defend against evolving threats.
This role is ideal for early-career engineers looking to apply their technical foundation in a mission-driven environment—gaining hands-on experience while contributing to real-world cyber operations from day one.
_Your Impact _
You'll support the development and evolution of cybersecurity tools and mission systems—helping drive both immediate operational needs and long-term capability growth. Day-to-day, that can look like:
Developing, maintaining, and enhancing software systems based on documented requirements
Collaborating with Red, Blue, and Hunt teams to support cyber tool development and mission needs
Assisting in troubleshooting software issues, debugging code, and resolving defects
Supporting development of tools used for vulnerability analysis, malware detection, and network defense
Participating in testing and validation to ensure software meets design and mission requirements
Contributing to CI/CD pipelines and modern development workflows
Working with data such as logs, binaries, and network traffic to support analysis and tool functionality
Providing input to system and software design, including component-level development and integration
Supporting rapid-response efforts to address emerging cyber threats
_Qualifications _
Active TS/SCI with polygraph
Bachelor's degree in Computer Science or related discipline
Four (4) years of additional software engineering experience may be substituted in lieu of a degree
Experience developing in C/C++, Python, and/or Java
Familiarity with Git and CI/CD workflows
Understanding of software development principles, debugging, and testing
Ability to work independently and within a collaborative team environment
_Nice to Have _
Exposure to reverse engineering, malware analysis, or vulnerability research
Ability to analyze binaries, logs, memory, or network traffic
Experience or familiarity with Red Team, Blue Team, or Hunt operations
Understanding of cybersecurity tools, techniques, or network fundamentals
Interest in automation, modern tooling, or AI-assisted development workflows