ApplyJob Type
Full-timeDescriptionMBL Technologies, Inc. offers a diverse set of management and technology consulting services to Federal government and commercial markets. Our solutions are tailored to support each client’s mission, accounting for their unique needs and operating environments to ensure success. We bring the right people, capabilities, and expertise together to assist our clients with enabling their mission. Together our individual differences drive successful business results.If you are transitioning from military to civilian life, have prior service, are a retired veteran, or a member of the National Guard or Reserves, or spouse of an active military service member, we encourage you to apply.
Please visit our webpage for information on our policies and benefits for the military and veteran community.
Why Work With Us?
- We trust, empower, and believe in our employees to soar to their fullest potential!
- We offer a robust benefits package (medical, dental, vision, STD, Accident, Life, Hospital Insurance, FSA, HSA, 401K match, professional development stipend, etc.).
- We love to have fun and give back to the community. Community Service and Employee Engagement events are atop our calendar events!
- We genuinely like each other and champion everyone to achieve their own greatness!
MBL Technologies is seeking a
Research and Development Specialist to join our team. The individual will be instrumental in supporting and enhancing our organizational initiatives through strategic consulting and program management. This role requires a blend of analytical skills, leadership capabilities, and effective communication to address customer requirements and drive successful project outcomes.
Research and Development Specialist (SP-TRD-001): Conducts software and systems engineering and software systems research to develop new capabilities, ensuring cybersecurity is fully integrated. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems This position offers a REMOTE environment.
Responsibilities
- Review and validate data mining and data warehousing programs, processes, and requirements.
- Research current technology to understand capabilities of required system or network.
- Identify cyber capabilities strategies for custom hardware and software development based on mission requirements.
- Collaborate with stakeholders to identify and/or develop appropriate solutions technology.
- Design and develop new tools/technologies as related to cybersecurity.
- Evaluate network infrastructure vulnerabilities to enhance capabilities being developed.
- Follow software and systems engineering life cycle standards and processes.
- Troubleshoot prototype design and process issues throughout the product design, development, and pre-launch phases.
- Identify functional- and security-related features to find opportunities for new capability development to exploit or mitigate vulnerabilities.
- Identify and/or develop reverse engineering tools to enhance capabilities and detect vulnerabilities.
- Develop data management capabilities (e.g., cloud-based, centralized cryptographic key management) to include support to the mobile workforce.
- Research and evaluate available technologies and standards to meet customer requirements.
Qualifications /
Skills
Skill in applying and incorporating information technologies into proposed solutions.
- Skill in applying secure coding techniques.
- Skill in applying and incorporating information technologies into proposed solutions.
- Skill in applying the systems engineering process.
- Skill in creating and utilizing mathematical or statistical models.
- Skill in designing the integration of technology processes and solutions, including legacy systems and modern programming languages.
- Skill in using scientific rules and methods to solve problems.
Required Skills
- Ability to identify systemic security issues based on the analysis of vulnerability and configuration data.
- Ability to prepare and present briefings.
- Ability to produce technical documentation.
- Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations.
Preferred Experience and Certifications
- Knowledge of application vulnerabilities.
- Knowledge of capabilities, applications, and potential vulnerabilities of network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware.
- Knowledge of engineering concepts as applied to computer architecture and associated computer hardware/software.
- Knowledge of Extensible Markup Language (XML) schemas.
- Knowledge of forensic footprint identification.
- Knowledge of hacking methodologies.
- Knowledge of industry standard security models.
- Knowledge of industry technologies’ potential cybersecurity vulnerabilities.
- Knowledge of laws, policies, procedures, or governance relevant to cybersecurity for critical infrastructures.
- Knowledge of middleware (e.g., enterprise service bus and message queuing).
- Knowledge of mobile communications architecture.
- Knowledge of network analysis tools used to identify software communications vulnerabilities.
- Knowledge of networking protocols.
- Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
- Knowledge of operating system structures and internals (e.g., process management, directory structure, installed applications).
- Knowledge of operations security.
- Knowledge of software reverse engineering techniques.
- Knowledge of system life cycle management principles, including software security and usability.
- Knowledge of penetration testing principles, tools, and techniques.
- Knowledge of the application firewall concepts and functions (e.g., Single point of authentication/audit/policy enforcement, message scanning for malicious content, data anonymization for PCI and PII compliance, data loss protection scanning, accelerated cryptographic operations, SSL security, REST/JSON processing).
- Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
- Knowledge of computer networking concepts and protocols, and network security methodologies.
- Knowledge of critical infrastructure systems with information communication technology that were designed without system security considerations.
- Knowledge of cyber threats and vulnerabilities.
- Knowledge of cybersecurity and privacy principles.
- Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
- Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
- Knowledge of specific operational impacts of cybersecurity lapses.
Recommended Qualifications
- This requires 7+ years of relevant cyber security experience and is a Senior Position.
MILITARY OCCUPATIONAL SPECIALTY CODES (MOS codes):
170A, 170D, 17A, 17B, 17C, 17D, 24B, 25B, 47D, 94F, IT, 17 5309, 6203, 9735, 9740, 9890, 9891
CORPORATE CITIZEN:
MBL Technologies’ vision is to make a positive difference – for our people, our customers, and our communities. As such, a commitment to service and excellence has been woven into the very fabric of our culture. MBL employees demonstrate a willingness to consistently go above and beyond and strive for excellence in all we do – championing, protecting, and celebrating the core business through the mission, vision, and values. All are expected to be good corporate citizens, supporting one another and internal corporate initiatives to build a stable business platform and ensure lasting company success.
Benefits:
MBL Technologies offers a competitive salary adjusted for candidate qualifications partnered with an industry-leading benefits package. This package includes incentive plans with corporate and individual-based performance bonuses, 401K, PTO, remote work, health and wellness programs, employee discounts, and learning and development reimbursement.
EEO STATEMENT:
MBL Technologies is an Equal Opportunity Employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability, or protected veteran status.