AnaVation, LLC
AnaVation is seeking a highly skilled Cyber Capability Developer to join our high performing team and lead the research, design, development, and execution of operational and analytic cyber capabilities in support of real world missions. In this role, you will create and refine tools and prototypes for operational use, perform in-depth analysis of cyber threat data, research emerging technologies and cyber techniques, and develop secure, mission-focused solutions that address complex challenges posed by cyber threat actors.
Key Responsibilities
Build, test, and refine operational prototypes
Analyze case-related and intelligence cyber data to develop advanced analytical tools
Perform research on novel capabilities derived from technical analysis
Research emerging technologies, techniques, and custom tools
Reverse engineer cyber tools and techniques to advance defensive capabilities
Perform network analysis and design in support of operations
Conduct vulnerability research and analysis of technical informationSupport systems integration activities
Develop custom scripts and tools for data collection, enrichment, and analysis
Implement secure development practices for sensitive operational tools
Collaborate with cross-functional teams to integrate solutions into existing environments
Active Top Secret (TS)
clearance with eligibility for Sensitive Compartmented Information (SCI) with a CI polygraph. This position is on-site with our customer in Chantilly, VA.
Required Qualifications
Bachelor's degree in Computer Science, Cyber security, or related field.
Minimum of 8 years of experience in cyber operations, cyber security, or related field.
Active Top Secret (TS) clearance
with eligibility for Sensitive Compartmented Information (SCI) with a CI polygraph.
Demonstrated experience developing advanced capabilities for cyber operations.
Proficiency with
Python
or other scripting languages for automation, data processing, and tool development.
Familiarity with
basic malware analysis techniques .
Experience with
network protocol analysis
(e.g., TCP/IP, HTTP, DNS).
Hands-on experience with
data collection and processing , including parsing, normalizing, and transforming structured and unstructured data.
Working knowledge of
Linux and Windows operating systems.
Understanding of
basic reverse engineering concepts
and tools to analyze binaries and software behavior.
Familiarity with
vulnerability assessment techniques , including identifying, validating, and documenting security weaknesses.
Experience using
version control systems (e.g., Git) .
Exposure to
containerization technologies (e.g., Docker)
for packaging, deploying, and running applications in isolated environment.
Strong understanding of cyber operations.
Experience mentoring junior developers and leading technical efforts.
Advanced proficiency with
Advanced programming in multiple languages
Complex malware analysis and reverse engineering
Exploit and vulnerability research
Advanced network analysis and protocols
Specialized cyber tool development
Custom data processing and analytics pipelines
Secure coding practices for operational tools
Cloud platforms (AWS GovCloud, SC2S, C2S)
DevSecOps practices for rapid deployment
Digital forensics tools and techniques
Memory analysis and disk forensics
Threat intelligence platforms
Elasticsearch, Splunk, and other data platforms
Virtualization technologies
Encryption and obfuscation techniques
Mobile device analysis
Desired Qualifications
Cloud Certifications
Experience with CI/CD pipelines
#J-18808-Ljbffr
Key Responsibilities
Build, test, and refine operational prototypes
Analyze case-related and intelligence cyber data to develop advanced analytical tools
Perform research on novel capabilities derived from technical analysis
Research emerging technologies, techniques, and custom tools
Reverse engineer cyber tools and techniques to advance defensive capabilities
Perform network analysis and design in support of operations
Conduct vulnerability research and analysis of technical informationSupport systems integration activities
Develop custom scripts and tools for data collection, enrichment, and analysis
Implement secure development practices for sensitive operational tools
Collaborate with cross-functional teams to integrate solutions into existing environments
Active Top Secret (TS)
clearance with eligibility for Sensitive Compartmented Information (SCI) with a CI polygraph. This position is on-site with our customer in Chantilly, VA.
Required Qualifications
Bachelor's degree in Computer Science, Cyber security, or related field.
Minimum of 8 years of experience in cyber operations, cyber security, or related field.
Active Top Secret (TS) clearance
with eligibility for Sensitive Compartmented Information (SCI) with a CI polygraph.
Demonstrated experience developing advanced capabilities for cyber operations.
Proficiency with
Python
or other scripting languages for automation, data processing, and tool development.
Familiarity with
basic malware analysis techniques .
Experience with
network protocol analysis
(e.g., TCP/IP, HTTP, DNS).
Hands-on experience with
data collection and processing , including parsing, normalizing, and transforming structured and unstructured data.
Working knowledge of
Linux and Windows operating systems.
Understanding of
basic reverse engineering concepts
and tools to analyze binaries and software behavior.
Familiarity with
vulnerability assessment techniques , including identifying, validating, and documenting security weaknesses.
Experience using
version control systems (e.g., Git) .
Exposure to
containerization technologies (e.g., Docker)
for packaging, deploying, and running applications in isolated environment.
Strong understanding of cyber operations.
Experience mentoring junior developers and leading technical efforts.
Advanced proficiency with
Advanced programming in multiple languages
Complex malware analysis and reverse engineering
Exploit and vulnerability research
Advanced network analysis and protocols
Specialized cyber tool development
Custom data processing and analytics pipelines
Secure coding practices for operational tools
Cloud platforms (AWS GovCloud, SC2S, C2S)
DevSecOps practices for rapid deployment
Digital forensics tools and techniques
Memory analysis and disk forensics
Threat intelligence platforms
Elasticsearch, Splunk, and other data platforms
Virtualization technologies
Encryption and obfuscation techniques
Mobile device analysis
Desired Qualifications
Cloud Certifications
Experience with CI/CD pipelines
#J-18808-Ljbffr