Logo
Lockheed Martin

Cyber Software Test Engineer

Lockheed Martin, Denver, Colorado, United States, 80285

Save Job

Description:

You will be the

Cyber Test Exploitation Engineer

for the research and development team, responsible for designing, executing, and automating exploitation‑focused test campaigns and performing comprehensive software testing to evaluate emerging technologies and ensure mission‑critical resilience. What You Will Be Doing As the Cyber Test Exploitation Engineer, you will develop and run sophisticated test‑and‑exploit methodologies, conduct core software‑testing activities, collaborate closely with customers and internal stakeholders throughout the development lifecycle, and help shape a culture of continuous security improvement. Your responsibilities will include: Designing and implementing automated exploitation frameworks and test suites for novel cyber‑engineering technologies. Conducting hands‑on penetration testing, vulnerability analysis, and proof‑of‑concept exploits against prototypes and operational systems. Developing, executing, and maintaining functional, regression, and integration test cases to verify that software behaves as intended. Creating automated test scripts (e.g., using Python, PowerShell, or CI/CD tools) to increase test coverage and reduce manual effort. Tracking test results, logging defects, and coordinating mitigation activities with development teams. Documenting findings, generating actionable remediation recommendations, and presenting results to customers and senior leadership. Partnering with software engineers, system architects, and mission customers to embed security‑by‑design and quality‑by‑design principles early in development. Mentoring team members on exploitation techniques, software‑testing best practices, and tool development. Contributing to a high‑performing, innovative team environment that values curiosity, creativity, and a one‑team mindset. What’s In It For You We are committed to supporting your work‑life balance and overall well‑being, offering flexible scheduling options. Who You Are The ideal candidate is a collaborative, detail‑oriented professional with deep expertise in cyber‑exploitation, penetration testing, and software testing (functional, regression, and automated testing). Basic Qualifications: Active TS clearance with SCI eligibility required prior to start. Experience designing, building, or automating test suites (functional, regression, integration) using at least one of these technologies. Fluent in two or more programming or scripting languages, e.g.: C/C++, Python, PowerShell, Java, JavaScript, Bash. Hands‑on experience using configuration‑management and version‑control tools such as: Git, SVN, TFS, Mercurial, Perforce. Formal education or professional experience in a relevant field: Cybersecurity, Electrical Engineering, Computer Engineering, Computer Science, Information Assurance, or a related discipline. Desired Skills: Experience with cloud‑native security platforms

(e.g., AWS Security Hub, Azure Sentinel, Google Chronicle). Container and orchestration hardening

– Docker, Kubernetes, OpenShift, and related security tooling (e.g., Falco, Aqua, Twistlock). Familiarity with AI/ML security concepts

such as adversarial machine‑learning testing, model‑poisoning detection, and secure deployment pipelines. Hardware/firmware reverse‑engineering

– ability to analyze BIOS/UEFI, embedded firmware, or IoT devices (e.g., using Chipsec, Binwalk, Ghidra). Threat modeling & secure architecture design

– expertise with STRIDE, PASTA, or MITRE ATT&CK for system‑level threat analysis. Knowledge of compliance frameworks and standards

– NIST 800‑53, ISO27001, IEC62443, DoD RMF, or CMMC requirements. Automation & orchestration scripting beyond testing

– creating custom CI/CD security gates, infrastructure‑as‑code security checks (e.g., Terraform, Ansible, Pulumi). Red‑team leadership or mentorship experience

– guiding junior analysts, conducting tabletop exercises, or managing multi‑discipline assessment teams. Secure software development practices

– static/dynamic analysis (e.g., SonarQube, Coverity), code‑review tooling, and secure coding standards (CWE, OWASP). Project‑management or Agile methodology familiarity

– Scrum, Kanban, or Earned Value Management for delivering security initiatives on schedule. Publications or community involvement

– speaking at security conferences, contributing to open‑source security tools, or authoring research papers. Hands‑on penetration‑testing / exploit‑development experience

with at least one of the following tools/frameworks: Metasploit, CobaltStrike, BurpSuite, ImmunityCANVAS, custom Python exploit frameworks. Security Clearance Statement:

This position requires a government security clearance, you must be a US Citizen for consideration. Clearance Level:

TS/SCI w/Poly Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics.

#J-18808-Ljbffr