Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Software Assurance Engineer image - Rise Careers
Job details

Software Assurance Engineer

At Agile Defense we know that action defines the outcome and new challenges require new solutions. That’s why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.


Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility—leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation’s vital interests.


Requisition #: 713

Job Title: Software Assurance Engineer

Location: REMOTE - Alexandria, VA

Clearance Level: Active DoD - Public Trust 


Required Certification(s): 

· CISSP (or equivalent), GCSA or possess a willingness to pursue certifications after hire 


SUMMARY

The United States Patent and Trademark Office (USPTO), Cybersecurity Division, has a requirement to establish a white-box testing capability within USPTO by adding contractor expertise to engage with existing system and product owners with the goal of supplementing companion effort penetration testing services. This effort will enhance data security protections by evaluating USPTO systems, with a specific focus on sensitive Business Impact Information (BII) systems that contain Intellectual Property (IP) and PII. 


A successful candidate will have verifiable experience in white-box testing, secure coding, static code analysis, dynamic application security testing, architecture security, Application Programmatic Interface (API) validation and communication skills. Strong technical capabilities, and an understanding of in-scope systems to the organization with respect to operational impact, is important as a key function of the role is to work closely with defensive partners. 


JOB DUTIES AND RESPONSIBILITIES 

· Perform code reviews to identify flaws in the development of custom applications that handle sensitive IP data, particularly those involving complex data transformations, encryption, or proprietary algorithms. 

· Drive configuration auditing through review of system and network configurations for misconfigurations or insecure settings that could lead to exploitation. 

· Execute access controls to validate and assess whether internal access controls effectively enforce the principle of least privilege and prevent unauthorized access to IP data. 

· Generate reports that highlight security weaknesses uncovered during white-box testing and provide actionable remediation steps. 

· Ensure that critical issues are resolved before new software releases or system updates go live, especially if they affect data-sharing processes or BII systems. 

· Research, test, build, and coordinate the conversion and/or continuous integration pipelines and toolchains based on client requirements. 

· Design and develop new software products or major enhancements to existing software to support security operations. 

· Address problems of systems integration, compatibility, automation and orchestrations. 

· Assesses cloud security architectures and provide recommendations to improve overall infrastructure security and methods to automate security testing of applications moving through the CI/CD pipeline. 


QUALIFICATIONS

Required Certifications 

· CISSP (or equivalent), GCSA or possess a willingness to pursue certifications after hire 


Education, Background, and Years of Experience 

· Bachelor’s degree/University degree or equivalent experience 


ADDITIONAL SKILLS & QUALIFICATIONS

Required Skills 

· 1+ years of relevant experience with most of the requirements below 

· Security Architecture reviews 

· DevSecOps CI/CI pipelines standards and best practices 

· Application Programming Interface (API) development and testing 

· Extensive experience working with White-Box testing methodologies and techniques 

· Static Application Security Testing tools. e.g., SonarQube, Veracode, Fortify 

· Dynamic Application Security Testing tools. e.g., OpenText Fortify WebInspect, Veracode, Invicti 

· Experience leveraging the MITRE ATT&CK Framework 

· Vulnerability Assessment tools. e.g., Nessus, Qualys, Rapid7 

· Exploitation frameworks, e.g., Metasploit, CANVAS, Core Impact 

· Deep understanding of OSI model 

· Security devices, i.e. Firewalls, VPN, AAA systems 

· OS Security. e.g. Unix/Linux, Windows, OSX 

· Understanding of common protocols. e.g. HTTP, LDAP, SMTP, DNS 

· Web application infrastructure. e.g. Application Servers, Web Servers, Databases 

· Demonstrated ability to collaborate with a variety of analytical groups and service delivery organizations 

· Advanced analytical and problem-solving skills 

· Consistently demonstrates clear and concise written and verbal communication 

· Proficient in interpreting and applying policies, standards and procedures 

· Demonstrated ability to remain unbiased in a diverse working environment 


Preferred Skills 

· Web development and programming languages. e.g. Python, Perl, Ruby, Java, .Net 


WORKING CONDITIONS

Environmental Conditions 

· Office setting. 


Strength Demands 

· Sedentary – 10 lbs. Maximum lifting, occasional lift/carry of small articles. Some occasional walking or standing may be required. Jobs are sedentary if walking and standing are required only occasionally, and all other sedentary criteria are met


Physical Requirements 

· Stand or Sit; Repetitive Motion; Use Hands / Fingers to Handle or Feel; See


Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together. What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.


Happy - Be Infectious.

Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.


Helpful - Be Supportive.

Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.


Honest - Be Trustworthy.

Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.


Humble - Be Grounded.

Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.


Hungry - Be Eager.

Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.


Hustle - Be Driven.

Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.


Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities

The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor’s legal duty to furnish information. 41 CFR 60-1.35(c)

Agile Defense Glassdoor Company Review
4.7 Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon
Agile Defense DE&I Review
4.7 Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon
CEO of Agile Defense
Agile Defense CEO photo
Jay Lee
Approve of CEO

Average salary estimate

$100000 / YEARLY (est.)
min
max
$80000K
$120000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Software Assurance Engineer, Agile Defense

Join Agile Defense as a Software Assurance Engineer and be part of a forward-thinking team that embraces change and champions innovation in Alexandria, VA. At Agile Defense, we're passionate about protecting our nation's critical missions and believe that your unique talents can help us achieve this goal. As a Software Assurance Engineer, you'll play a pivotal role by supporting the United States Patent and Trademark Office (USPTO) Cybersecurity Division. Your primary responsibility will be establishing a white-box testing capability to ensure our systems are resilient and secure. You'll collaborate with system and product owners, focusing on sensitive Business Impact Information systems—where protecting Intellectual Property and Personally Identifiable Information is paramount. If you have a knack for secure coding, conducting code reviews, and employing extensive testing methodologies, we want you on our team! Your grasp of dynamic application security testing and experience in identifying security weaknesses will directly contribute to actionable improvements in software releases. You'll have the opportunity to leverage tools like SonarQube and Nessus to provide expert guidance on cloud security architectures. Plus, at Agile Defense, you'll be embraced as part of a supportive family-like culture where your contributions are valued, and there's room for your personal and professional growth. Ready to advance your career with us? Let's innovate together to build a safer tomorrow!

Frequently Asked Questions (FAQs) for Software Assurance Engineer Role at Agile Defense
What are the main responsibilities of a Software Assurance Engineer at Agile Defense?

As a Software Assurance Engineer at Agile Defense, your main responsibilities will include performing code reviews to detect vulnerabilities in custom applications, executing configuration audits to find misconfigurations, validating access controls, generating security reports, and ensuring critical security issues are addressed before software releases. In doing so, you will work closely with system owners to protect sensitive Business Impact Information and enhance overall system security.

Join Rise to see the full answer
What qualifications are needed for the Software Assurance Engineer position at Agile Defense?

To qualify for the Software Assurance Engineer position at Agile Defense, candidates must hold a Bachelor's degree or equivalent experience. Additionally, required certifications include a CISSP or equivalent, as well as a willingness to pursue further certifications after hire. Practical experience in secure coding practices, white-box testing, and various security tools and methodologies is essential to succeed in this role.

Join Rise to see the full answer
What specific skills are required for a Software Assurance Engineer at Agile Defense?

Candidates looking to become a Software Assurance Engineer at Agile Defense should have a solid background in security architecture reviews, experience with DevSecOps CI/CD pipeline standards, and proficiency in application programming interfaces (API) testing. Familiarity with tools such as SonarQube, Veracode, and Nessus will be critical, alongside a deep understanding of common protocols and operating systems.

Join Rise to see the full answer
How does Agile Defense support the career growth of a Software Assurance Engineer?

Agile Defense promotes a vibrant and supportive culture that values employee growth. As a Software Assurance Engineer, you will have access to training opportunities, mentorship programs, and professional development resources to enhance your skills and advance your career. The company's commitment to innovation and excellence ensures you'll be recognized and rewarded for your contributions.

Join Rise to see the full answer
What role does collaboration play in the Software Assurance Engineer position at Agile Defense?

Collaboration is integral to the success of a Software Assurance Engineer at Agile Defense. You will work closely with a diverse team of system and product owners, leveraging each other’s expertise to bolster the security posture of sensitive systems. Effective communication and teamwork will lead to successful outcomes in your role, enhancing both personal success and client satisfaction.

Join Rise to see the full answer
Common Interview Questions for Software Assurance Engineer
Can you explain your experience with white-box testing?

When answering this question, it's important to highlight specific projects where you've utilized white-box testing methodologies. Discuss the tools you used, the types of systems you tested, and the outcomes of your assessments. Provide examples of vulnerabilities you discovered and how you tackled them.

Join Rise to see the full answer
What methodologies do you use for conducting secure coding audits?

To effectively answer, describe the audit processes you follow, any frameworks or guidelines you adhere to, and the types of vulnerabilities you specifically look for. Mention your experience with both manual and automated auditing techniques, highlighting how this has benefited previous projects.

Join Rise to see the full answer
How do you ensure effective access controls in your security assessments?

In your response, explain how you assess existing access controls and the tools you're familiar with for managing internal permissions. Discuss specific scenarios where you’ve implemented the principle of least privilege and how you validate these controls in your assessments.

Join Rise to see the full answer
What experience do you have with vulnerability assessment tools?

When addressing this question, list the specific vulnerability assessment tools you've worked with—such as Nessus, Qualys, or Rapid7. Discuss your hands-on experiences, what findings you uncovered, and how you communicated recommendations for remediation.

Join Rise to see the full answer
What is your experience with CI/CD pipelines in relation to security?

Explain the importance of CI/CD pipelines in software development and how security testing integrates into this process. Share any experiences you have with automating security checks within these pipelines, discussing the tools you utilized and the benefits they provided.

Join Rise to see the full answer
How would you handle a critical security flaw uncovered during a software review?

In your response, discuss your approach to documenting the flaw, assessing its impact, and working with development teams to prioritize remediation. Emphasize the importance of communication and collaboration in addressing critical security issues effectively.

Join Rise to see the full answer
Can you provide an example of a security challenge you successfully addressed in a previous position?

Share a specific example where you identified a significant security vulnerability and detail the steps you took to resolve it. Highlight not only the technical aspects of your approach but also how you collaborated with your team and communicated results to stakeholders.

Join Rise to see the full answer
What strategies do you use to stay current with security trends?

Discuss your commitment to professional development and list resources like webinars, industry conferences, and relevant literature that you engage with. Mention any professional organizations or communities you belong to that help you stay informed about evolving security threats.

Join Rise to see the full answer
How do you approach learning new security tools or methodologies?

Explain your process for learning new tools or methodologies, which may include hands-on practice labs, online courses, or mentoring from experienced colleagues. Illustrate this with a brief example of a recent tool you've learned about and how you applied it in your work.

Join Rise to see the full answer
What is your understanding of the MITRE ATT&CK framework and its relevance?

Provide an overview of the MITRE ATT&CK framework and how it helps identify and categorize tactics, techniques, and procedures used by cyber adversaries. Discuss past experiences where you've applied this framework in security assessments or incident response, showing its importance in enhancing overall security measures.

Join Rise to see the full answer
Similar Jobs
Talent Engine Remote No location specified
Posted 2 days ago
Photo of the Rise User
Whatnot On-Site Multiple Locations
Posted 3 days ago
Photo of the Rise User
Brillio Remote Edison, New Jersey, United States
Posted yesterday
Posted 10 days ago
Photo of the Rise User
Posted 2 days ago
Photo of the Rise User
Posted 10 hours ago

Agile Defense's mission is to transform our government customers' organizations using Information Technology so that they can meet their mission's deadlines with efficiency and quality.

118 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, remote
DATE POSTED
January 9, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!