Junior Software Developerother related Employment listings - Aberdeen Proving Ground, MD at Geebo

Junior Software Developer

Title:
Junior Systems Engineer Clearance Level:
Active Secret, TS/SCI eligibleLocation:
Aberdeen Proving GroundProgram Details &
Summary:
Newly Awarded 5 year program.
Start Date:
August 2,.
2021Minimum LCAT Requirements -Requires Bachelors degree and 2-4 years of prior relevant experience, a Master's degree with less than 2 years relevant experience, or equivalent work experience may be considered in lieu of degree.
Must possess a minimum active DoD Secret clearance and be eligible to obtain a TS/SCI clearance.
Required Technology Skills:
DoD 8570 IAT I certifications required prior to starting and computing environment certifications Must be a US Citizen.
Must possess a minimum active DoD Secret clearance and be eligible to obtain a TS/SCI clearance.
Must have API development experience.
Proven experience working across multiple tiers of an application, including backend data store (database, Elasticsearch), network, operating system, and virtual environments.
Proficiency with Scala and Java is a must.
Experience with ReactJS, NodeJS, JavaScript.
Proficiency with Elasticsearch API.
Experience with Spring and Play Frameworks.
Understanding of NoSQL databases and JSON and experience/familiarity with application servers (Jetty, etc.
).
Experience with Python.
Excellent object-oriented design and programming skills.
?Requires Sec
Preferred Skills:
Understanding of core current cybersecurity technologies as well as emerging capabilities.
Ability to communicate effectively with various team members and clients and to explain and elaborate on technical details Motivated self-starterDay to day
Responsibilities:
Troubleshoot coding / configuration / installation issues of basic to medium complexity.
Support the development of detailed specifications and engage in application design and data modeling discussions.
Develop and enforce data security policies.
Perform capacity monitoring and planning.
Build, maintain and execute unit test cases with high code coverage.
Analyze and estimate timelines for sprints and releases.
Work in an Agile environment and adapt to the changing needs and requirements of the business.
Develop and fix issues with highest attention to quality.
Work closely with team members to create test plans, and ensures the issues are properly identified, fixed and tested.
Use established best practices to develop code.
Work with senior developers to craft and extend a variety of application programming interfaces for analytic platforms serving cybersecurity operations.
Create, implement, update, and sustain several cyber analysis user interface tools with a heavy reliance on a variety of API mechanisms for current DoD clients.
Working collaboratively with a small development operations (DevOps) based project team.
Responsible for working with the team to develop several interfaces, across a variety of cybersecurity operational capabilities, with a focus on data-driven analytics, situational awareness, and agent-based actions.
Proactively learn product frameworks and code base.
Familiarity with ElasticSearch backend, including querying and aggregation for building simple and complex summaries of data.
Work with SCALA and JAVA created user interfaces as part of a larger big data analytics type framework supporting cybersecurity operations.
Assist in design and implementation of new API features and functionality, as well as updating current API capabilities based on mission need.
Build RESTful API for web single page application/s.
Analyze requirements from clients to derive software design and performance requirements.
.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.