The CNO Developer will design, implement, and support advanced applications and utilities targeting Windows platforms. Operating in a tailored agile environment, the developer will contribute to mission-critical capabilities across multiple levels of technical complexity—from fundamental tooling to strategic exploitation frameworks. This position supports national security objectives through innovation, reverse engineering, and secure coding practices.
Key Responsibilities:
- Develop and maintain CNO tools and utilities for Windows OS using C/C++, Python, and Assembly
- Perform vulnerability research and implement advanced reverse engineering techniques
- Utilize industry-standard tools such as IDA Pro, Ghidra, WinDbg, and custom frameworks
- Participate in sprint planning, technical design reviews, code documentation, and testing
- Contribute to Agile/DevSecOps workflows including CI/CD pipelines and secure coding standards
- Collaborate with multidisciplinary teams and provide mentorship to junior team members
- Architect scalable and stealthy solutions for Windows-based operations and red-teaming efforts
- Integrate system-level scripts, drivers, and kernel components as needed
Required Qualifications:
- Bachelor’s or Master’s degree in Computer Science, Cybersecurity, or related technical field
- Hands-on experience with Windows internals, debugging, exploitation, and kernel-level development
- Proficiency in reverse engineering, malware analysis, or network operations tooling
- Familiarity with Agile software development methodologies
- Ability to work independently and collaboratively in a mission-oriented environment
- Active [security clearance] or eligibility to obtain one
Required Clearance:
- Must have an Active TS/SCI with Poly.
Preferred Experience:
- 3–7+ years in CNO development, vulnerability discovery, or tool deployment in federal settings
- Experience mentoring junior staff or leading technical development efforts
- Knowledge of low-level APIs, registry structures, Windows driver architecture, and stealth methodology