Cookies & analytics consent
We serve candidates globally, so we only activate Google Tag Manager and other analytics after you opt in. This keeps us aligned with GDPR/UK DPA, ePrivacy, LGPD, and similar rules. Essential features still run without analytics cookies.
Read how we use data in our Privacy Policy and Terms of Service.
🤖 15+ AI Agents working for you. Find jobs, score and update resumes, cover letter, interview questions, missing keywords, and lots more.

Analygence • Dahlgren, Virginia, United States
Role & seniority: Security Software Engineer (mid–senior; 5+ years in software engineering and security-focused roles; DoD/IT systems experience)
Offensive security: Kali Linux, Metasploit, NMAP, Cobalt Strike; Red Team operations
Languages: Python, C, C#, C++, Go, Perl, PowerShell, PHP, Java, HTML, SQL, NoSQL
OS/controls: Windows, Linux; DISA STIGs; NSA-approved encryption; firewalls/secure protocols
Cloud/virtualization: AWS (EC2, S3, RDS, KMS), VMware NSX, vCenter, vRealize, Horizon View
Directory services: Active Directory, Entra ID (Azure AD), SSO/MFA/Identity Federation
Automation/infra: PowerShell, PowerAutomate, Logic Apps, Graph API
Storage/backup: NetApp ONTAP; SnapMirror
Testing/analysis: static code analysis, code reviews, secure coding recommendations
Web/app security: REST/SOAP, OAuth2, SAML, LDAP; MDE environments
Perform penetration testing, Red Team ops, and simulate adversary tactics
Reverse engineer/debug code; conduct static analysis; author secure coding recommendations
Develop/debug software and scripts; design/maintain GUIs; apply security best practices across on-prem and hybrid environments
5+ years software engineering applied to DoD/IT systems; strong Linux and Windows proficiency
Proficiency with Kali, Metasploit, NMAP, Cobalt Strike; DoD 8570.01 IAT Level II
Programming: Python, C, C#, C++, Go, Perl, PowerShell
DoD cybe
Perform penetration testing and Red Team operations, simulating adversary tactics using tools such as Kali Linux, Metasploit, NMAP, and Cobalt Strike. Reverse engineer and debug compiled and source code to identify vulnerabilities and develop remediation strategies. Conduct static source code analysis, participate in code reviews, and author secure coding recommendations. Develop and debug software and scripts in Python, C, C#, C++, Go, Perl, PowerShell, PHP, ASP, Java, HTML, SQL, and NoSQL environments. Analyze and monitor systems using Windows Event Logs, Linux syslogs, boot logs, and dmesg. Design and maintain GUIs; manage configuration using tools such as Rational ClearCase. Identify flaws in systems running VxWorks, LynxOS, and enterprise operating systems (Windows, HP-UX, UNIX, Solaris, Linux). Work with virtualization and enterprise platforms such as VMware NSX, vCenter, vRealize Suite, Horizon View (VDI). Apply DISA STIGs and security best practices across on-premise and hybrid infrastructures. Implement NSA-approved encryption technologies and integrate secure protocols and firewalls (PAN-OS, FirePower, Nexus, IOS, ASA). Administer and secure directory services including Active Directory, Entra ID (Azure AD), with integration for SSO, MFA, Azure App Integration, and Identity Federation. Automate processes using PowerShell, PowerAutomate, Logic Apps, and Graph API. Manage and secure environments with NetApp ONTAP, SnapMirror, and Microsoft 365 in hybrid deployments. Conduct Red Team operations in Microsoft Defender for Endpoint (MDE) environments. Perform Web Application Penetration Testing for RESTful/SOAP services and OAuth2, SAML, LDAP protocols. Support cloud-native security efforts within AWS, including services like EC2, S3, RDS, KMS, and microservice/serverless architectures. Recommend secure software architecture enhancements and contribute to tool/exploit/C2 development. Requirements Minimum of 5 years of experience in software engineering applied to program development; modeling and simulation applied to DoD or IT Systems.
Associated training: COMPTIA Linux+ or FedVTE Linux+
Associated training: Microsoft Courses (MCSA or related) Working knowledge of common Penetration Testing tools i.e. Kali, Metasploit, NMAP, Cobalt Strike