Augusta, GA 30905

Ad hoc Research is looking for a Computer Programmer/Software Engineer M&S for the Cyber Battle Lab (CBL) program. The mission of the CBL is to provide overall direction, oversight, vertical and horizontal integration of CO, DODIN-A, and EW activities focused on the development of a Multi-Domain Operations (MDO) Force (2028 – 2035) for the Army as defined by the Army Modernization Strategy (AMS), guided by the Annual Mission Guidance (AMG), and sanctioned by the AFC.

The role will be located at Fort Gordon, Georgia.

Required Qualifications:

  • Security Clearance: obtain and maintain TS with SCI eligibility.
  • Certification & Training, Day 1: IAT Level I.
  • Verification of training, certification or at least 5 years hands-on-experience in utilizing the following software applications and simulation environments:
  • Delphi, EXata, QUALNET, Joint Network Emulator (JNE), OneSAF, C++ and C, MS Visual Studio, Visual Basic, SQL Server 2014 and all previous versions, Transact SQL, Rational Purify, Perl, Systems Tool Kit (STK), Active Directory, DNS, DHCP, Mail Server, Print Server, LDAP, Kerberos, Systems Planning, Engineering, and Evaluation Device (SPEED), Microsoft SharePoint, CO Enhanced Network and Training Simulators (CENTS) and the Naval Research Laboratories Builder model.
  • Certification & Training, CE, within 6 months: (1) for Windows: pass MS Exam 70‐411 “Administering Windows Server 2012”; or complete Windows training approved by the IAM/COR; and (2) for Linux: Linux+CE certification; or Linux training approved by the IAM/COR.
  • Minimum of five (5) years’ of hands on experience in:
  • TCP/IP, Ethernet, wireless transmission devices, network security, ethical hacking, network and computer system fundamentals, cryptography, foot printing, scanning, enumeration, system hacking, malware, sniffers, social engineering, denial of service, session hijacking, web servers and applications, SQL injection, hacking Wi-Fi and Bluetooth, mobile device security, evasion, cloud technologies and security, and penetration testing frameworks; and advanced experience dissecting and analyzing: HTML, JavaScript, C, C++, Java, Python, PHP, ASP, NETMySQL, VirtualBox, and VMware.
  • Proficiencies: possess the knowledge, skills and abilities to build an emulation environment to conduct ethical hacking using IP Schemas, the OSI Model, LANs/WANs, switch, router, firewall, access point, SNMP, ARP, NAT, HTTP, FTP, Telnet, RDP, SSH, POP, SMTP, SSL, and NetBIOS.

Must be an effective communicator both verbally and in writing. Most positions require ability to work on a desktop or laptop computer for extended periods of time. Computer activities include reading, reviewing and analyzing information, as well as providing recommendations, summaries, and reports in written or verbal format. Additionally, positions require ability to sit at a workstation for extended periods; use hand(s) to handle or feel objects, tools, or controls; reach with hands and arms; as well as speak and hear.

Employee may be required to occasionally lift and/or move moderate amounts of weight, typically less than 20 pounds. Regular and predictable attendance is essential.

Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status, and any other characteristic protected by federal, state, and local law.