Logo
Jobs via Dice

Cyber Software Test Engineer

Jobs via Dice, Denver, Colorado, United States, 80285

Save Job

Join to apply for the

Cyber Software Test Engineer

role at

Jobs via Dice .

We are looking for a

Cyber Test Exploitation Engineer

to join our research and development team, responsible for designing, executing, and automating exploitation‑focused test campaigns and performing comprehensive software testing to evaluate emerging technologies and ensure mission‑critical resilience.

What You Will Be Doing As the Cyber Test Exploitation Engineer, you will develop and run sophisticated test‑and‑exploit methodologies, conduct core software‑testing activities, collaborate closely with customers and internal stakeholders throughout the development lifecycle, and help shape a culture of continuous security improvement.

Your Responsibilities

Design and implement automated exploitation frameworks and test suites for novel cyber‑engineering technologies.

Conduct hands‑on penetration testing, vulnerability analysis, and proof‑of‑concept exploits against prototypes and operational systems.

Develop, execute, and maintain functional, regression, and integration test cases to verify that software behaves as intended.

Create automated test scripts (e.g., using Python, PowerShell, or CI/CD tools) to increase test coverage and reduce manual effort.

Track test results, log defects, and coordinate mitigation activities with development teams.

Document findings, generate actionable remediation recommendations, and present results to customers and senior leadership.

Partner with software engineers, system architects, and mission customers to embed security‑by‑design and quality‑by‑design principles early in development.

Mentor team members on exploitation techniques, software‑testing best practices, and tool development.

Contribute to a high‑performing, innovative team environment that values curiosity, creativity, and a one‑team mindset.

What's In It For You We offer flexible scheduling options and a comprehensive benefits package.

Who You Are The ideal candidate is a collaborative, detail‑oriented professional with deep expertise in cyber‑exploitation, penetration testing, and software testing (functional, regression, and automated testing). You thrive in fast‑paced, dynamic environments, adapt quickly to evolving customer requirements, and excel at communicating complex technical findings to both technical and non‑technical audiences. A strong commitment to mission success, team innovation, and continuous learning is essential.

Basic Qualifications

Active TS clearance with SCI eligibility required prior to start.

Experience designing, building, or automating test suites (functional, regression, integration) using at least one of these technologies:

pytest/pytest‑qt, Selenium, TestNG, Jenkins, Azure DevOps, GitLab CI/CD

Fluent in two or more programming or scripting languages (e.g., C/C++, Python, PowerShell, Java, JavaScript, Bash).

Hands‑on experience using configuration‑management and version‑control tools such as Git, SVN, TFS, Mercurial, Perforce.

Formal education or professional experience in cybersecurity, electrical engineering, computer engineering, computer science, information assurance, or a related discipline.

Desired Skills

Experience with cloud‑native security platforms (AWS Security Hub, Azure Sentinel, Google Chronicle).

Container and orchestration hardening – Docker, Kubernetes, OpenShift, and related security tooling (Falco, Aqua, Twistlock).

Familiarity with AI/ML security concepts such as adversarial machine‑learning testing, model‑poisoning detection, and secure deployment pipelines.

Hardware/firmware reverse‑engineering – ability to analyze BIOS/UEFI, embedded firmware, or IoT devices (e.g., Chipsec, Binwalk, Ghidra).

Threat modeling & secure architecture design – expertise with STRIDE, PASTA, or MITRE ATT&CK for system‑level threat analysis.

Knowledge of compliance frameworks and standards – NIST 800‑53, ISO 27001, IEC 62443, DoD RMF, CMMC requirements.

Automation & orchestration scripting beyond testing – creating custom CI/CD security gates, infrastructure‑as‑code security checks (Terraform, Ansible, Pulumi).

Red‑team leadership or mentorship experience – guiding junior analysts, conducting tabletop exercises, or managing multi‑discipline assessment teams.

Secure software development practices – static/dynamic analysis (SonarQube, Coverity), code‑review tooling, and secure coding standards (CWE, OWASP).

Project‑management or Agile methodology familiarity – Scrum, Kanban, or Earned Value Management for delivering security initiatives on schedule.

Publications or community involvement – speaking at security conferences, contributing to open‑source security tools, or authoring research papers.

Hands‑on penetration‑testing / exploit‑development experience with at least one of the following tools/frameworks:

Metasploit, Cobalt Strike, Burp Suite, Immunity CANVAS, custom Python exploit frameworks.

EEO Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics.

Application Window The application window will close in 90 days; applicants are encouraged to apply within 5–30 days of the requisition posting date for optimal consideration.

Compensation and Benefits The annual base salary range for this position in various states is $97,100 - $171,235. For most major metropolitan areas, the range is $111,700 - $193,660. This position is incentive plan eligible. Benefits offered include medical, dental, vision, life insurance, short‑term disability, long‑term disability, 401(k) match, flexible spending accounts, EAP, education assistance, parental leave, paid time off, and holidays.

#J-18808-Ljbffr