Skip to content

CNO Lead Python Developer
Company | Parsons |
---|
Location | Columbia, MD, USA |
---|
Salary | $144800 – $260600 |
---|
Type | Full-Time |
---|
Degrees | Bachelor’s, Master’s |
---|
Experience Level | Expert or higher |
---|
Requirements
- Active TS/SCI + Poly required for consideration
- Bachelor’s degree in related field (Computer Science, Cybersecurity, Computer Engineering, etc.)
- Minimum 10+ years of experience in exploit/CNO tool development; Master’s degree in relevant field will be considered in lieu of 4 years on experience (i.e. Master’s and 6 years of exploit/CNO tool development experience)
- Minimum 5+ years utilizing programming languages such as Python, C, C++, x86
- Ability to analyze proof-of-concept exploit/CVE vulnerability and engineer it to be stable and repeatable
- Extensive experience in reverse-engineering both compiled binaries and source code to identify vulnerabilities
Responsibilities
- Performs weaponization/productization of proof-of-concept exploits or CVE vulnerabilities to ensure these capabilities are operationally ready to be used on live infrastructure.
- Works with the vulnerability research team to gather relevant information on proof-of-concept exploits they generate and engages with the customer to ensure the product meets operational needs.
- Implements appropriate development and support tools to ensure product performance.
Preferred Qualifications
- Minimum 15+ years of experience in exploit/CNO tool development
- Minimum 13+ years utilizing programming languages such as Python, C, C++, x86
- Master’s degree in related field (Computer Science, Cybersecurity, Computer Engineering, etc.)
- Building and designing small to medium applications in Python
- Other Languages: C/C++ or assembly
- Other Platforms: Either Windows, Unix, or Hardware
- Other Skills: .NET Framework development and knowledge of Windows Internals, Vulnerability Analysis or Kernel / system level programming
- Certified/trained in one or more of the following: Corelan Bootcamp/Advanced, ManTech ACTP Windows/Linux/VR&E, OSCP, OSED, OSWE
- Experience with Ghidra, GDB, WinDebug or Fuzzing