Vacancy expired!
- If selected, there might be a background check that includes a drug screen (usually 4-panel-excluding marijuana) and sometimes credit checks for financial clients.
- Most companies might also have a vaccine mandate, so once hired, we (or the client) will ask for proof of vaccination if required. If you are not vaccinated, we/they might ask you to work with them on a religious or medical exemption if necessary.
- NOT open to Corp to Corp
- Those authorized to work in the US are encouraged to apply.
- DKKD Staffing does not sponsor and cannot support H1, TN, etc. No outside agencies please.
- Stabilized Turret Drive Systems
- Integrated Weapon Systems (full turret from mechanical design to fire control electronics and software)
- Ammunition Handling
- Data Control and Distribution
- Power Management and Distribution
- Design, develop, implement, and monitor an auditable set of life cycle processes to assess, document, any/all cyber security requirements for software/embedded systems within products
- Vulnerability Analysis to identify and document potential cyber vulnerabilities including logic/coding flaws, inter-device communication weaknesses, and potential hidden or “backdoor” entry points
- Gather and organize technical information from customer requirements/needs regarding cyber security including the products’ mission, goals and needs
- Perform risk assessment and analysis of embedded systems/applications within products from concept through product end-of-life
- Identify current and emerging embedded system products technology issues, including security trends, vulnerabilities, and threats
- Pro-actively identify, recommend, and implement new cyber security solutions and strategies to resolve/mitigate any cyber security issues and protect embedded systems products
- Minimum 5 years of experience developing secure embedded code within a structured system development life cycle (SDLC)
- Coding skills/Environments: Linux, RTOS, C, C, Java
- Experience with vulnerability assessment tools such as Coverity, HP Fortify, Veracode, Black Duck, etc.
- Strong awareness of cybersecurity trends and hacking techniques
- Thorough understanding of the latest security principles, techniques, and
- Experience with network security, networking technologies, and network monitoring tools
- Knowledge of networking protocols, such as TCP/IP
- Experience with device communication protocols such as I2C, SPI, 1553, CANBus, etc., is desirable
- Industry Certification(s) desirable, i.e., Certified Secure Software Lifecycle Professional, Certified Information Systems Security Professional, Global Information Assurance Cert., Certified Ethical Hacker, Certified Information Security Manager (CSSLP, CISSP, GICSP, GSEC, CEH or CISM)
- Ability to access US export-controlled documentation
- Name:
- Best Contact Info:
- Your Linked In:
- Where do you live and your desired geographical location:
- Why looking for a new job:
- Availability for interviews and a new job:
- Willing to work 100% on-site or hybrid:
- Are you open to relocation if required:
- Do you have an active passport if needed for the job:
- Are you open to travel if needed:
- Are you authorized to work in the US (Please indicate US, , or Other):
- If not or do you require sponsorship at any time, or will you in the future?
- Salary Expectations: (We need a range) $
- Sizes of staff overseen and their titles: (include # of direct reports)
- Budgetary Responsibility: $
- Education/Certs/Degrees: (also indicate which certs are active)
- Who Referred You/ How Did You Hear About Job/ DKKD Staffing:
- This job requires access to US export-controlled information. Can you demonstrate that you are either a or a US lawful permanent resident:
- Do you have experience with device communication protocols such as I2C, SPI, 1553, CANBus, etc.:
- Are you certified in any of the following; Industry Certification(s) desirable, i.e., Certified Secure Software Lifecycle Professional, Certified Information Systems Security Professional, Global Information Assurance Cert., Certified Ethical Hacker, Certified Information Security Manager (CSSLP, CISSP, GICSP, GSEC, CEH or CISM):
- Ability to access US export-controlled documentation:
- Do you have knowledge of networking protocols, such as TCP/IP:
- Do have coding skills/Environments: Linux, RTOS, C, C, Java:
- Do you have experience with vulnerability assessment tools such as Coverity, HP Fortify, Veracode, Black Duck, etc.:
- ID: #41300913
- State: California Santa barbara 93101 Santa barbara USA
- City: Santa barbara
- Salary: Depends on Experience
- Job type: Permanent
- Showed: 2022-05-21
- Deadline: 2022-07-19
- Category: Et cetera