Contact Information

Annapolis Junction, Maryland

Req #: R118990


  • US - MD, Annapolis Junction
  • US - MD, Linthicum

Minimum Clearance Required to Start:

Top Secret SCI w/Polygraph

Job Description:

Ready to be part of a cutting edge growing Cyber Security project that will make a huge impact on the DOD/Intel community?

This exciting role includes performing traditional System Engineering and Vulnerability research with a focus on OCO (Offensive Cyber Operations) and DCO (Defensive Cyber Operations) activities. Support large scale weapons systems and other national security operations. 

Work with customers directly performing full cycle system engineering, gathering requirements and source code, to technical documentation and specifications.

Performing long term, in depth vulnerability assessments using reverse engineering, kernel debugging, and exploitation technologies. Engineers are encouraged to be creative and exhaust every technical avenue to uncover weaknesses of the system and exploit them.  The feasibility and impact of the findings will often require team members to develop prototype exploitations based on identified vulnerabilities.


Position will include infrequent travel. 


  • H. S. Diploma and 11+ years in software development and maintenance OR Bachelor's degree in Computer Science/Engineering/related field and 7 yrs OR Master's degree in Computer Science/Engineering/related field and 5 yrs

  • Documented formal training on the Software Engineering Institute (SEI) Capability Maturity Model Integration for Development (CMMI-DEV) Model or documented experience working on projects that applied some portions of this model.

  • Documented formal training on DOD standard for software testing and documentation or documented experience working on projects that applied these standards.

  • Experience in x86/x64 assembly, software reverse engineering, kernel debugging, and protocol stacks

  • Experience in Software Reverse Engineering with at least 1 of the following tool or an equivalent: IDAPro, GDB, WinDbg, Immunity/OllyDbg

  • Experience developing computer exploits




  • Experience with the following software technologies: Java, C+, Python,  C, Embedded Software Engineering, or similar Object oriented languages

  • Experience in malware analysis and mitigation techniques

  • Computer implant architecture and development

  • Strong understanding of the Windows and Linux Operating System internals and APIs

  • Knowledge of analyzing shellcode, packed and obfuscated and the associated algorithms a plus

  • Experience with scripting languages such as Python, Bash, Pearl, etc

  • Experience in host and network analysis to identify and characterize anomalies and vulnerabilities in the platform

  • Experience documenting findings in reports and briefings

  • Security certifications a plus: CISSP, CEH, CREA, GPEN, GREM, OSCP, OSCE

Must be able to obtain, maintain and/or currently possess a security clearance.

The position requires a COVID vaccination or an approved accommodation/exemption for a disability/medical condition or religious belief.

Annapolis Junction, Maryland

Contact Information

Founded in 1944, Parsons, an engineering, construction, technical, and management services firm with revenues of $2.7 billion in 2011, is 100% owned by the Employee Stock Ownership Trust. We conquer the toughest logistical challenges and deliver design/design-build, program/construction management, and other professional services packaged in innovative alternative delivery methods to federal, regional, and local government agencies, as well as to private industrial customers worldwide. Parsons is a leader in many diversified markets with a focus on transportation, environmental/infrastructure, and defense/security.

Similar jobs