Himalayas logo
PeratonPE

Secure Software Assessment SME

Peraton is a national security company that provides technology solutions and mission capabilities to U.S. government agencies, covering space, intelligence, cyber, defense, and homeland security.

Peraton

Employee count: 5000+

Salary: 80k-128k USD

United States only

Stay safe on Himalayas

Never send money to companies. Jobs on Himalayas will never require payment from applicants.

Responsibilities

Peraton is seeking a Secure Software Assessment SME. Peraton’s Defense Mission and Global Health Solutions Sector is seeking a for the Department of Defense (DoD). The successful candidate will be responsible for ensuring the security of software applications through secure coding practices and code vulnerability assessments. Lead a team of application security specialists, providing guidance on secure coding practices and static/dynamic analysis methodologies. Provide guidance to development teams on secure coding techniques and remediation strategies for identified vulnerabilities. Oversee the execution of application security assessments, including code reviews and vulnerability scans, to identify security flaws in software applications. Provide actionable recommendations to development teams and stakeholders, based on assessment findings, to improve application security and mitigate identified risks. Develop and maintain application security procedures to promote secure software development practices.

What You’ll Do:

  • Conduct Code Vulnerability Assessments: Perform rigorous static and dynamic code analysis to identify vulnerabilities in software applications. Utilize tools like SAST (Static Application Security Testing) and DAST (Dynamic Application Security Testing) to ensure the application’s security posture.
  • Lead and Guide Application Security Teams: Manage and mentor a team of application security specialists, providing technical leadership and guidance on complex vulnerability analyses. Review team findings to ensure accurate results and high-quality deliverables.
  • Promote and Train on Secure Coding Practices: Educate and provide training to development teams on secure coding techniques and common vulnerabilities (e.g., based on OWASP Top Ten, CWE/SANS Top 25). Deliver workshops or guidelines on defensive coding against injection attacks, cross-site scripting (XSS), secure authentication, etc.
  • Oversee Secure Software Assessments: Plan, prioritize, and execute secure software assessments across the software lifecycle, including secure design reviews, code audits, and vulnerability testing. Ensure assessments align with organizational and DoD policies for application security.
  • Provide Vulnerability Remediation Guidance: Offer actionable recommendations to developers, architects, and system owners to remediate identified code vulnerabilities and improve the security of applications. Ensure that all secure recommendations align with development timelines and technical feasibility.
  • Develop and Maintain Security Procedures and Guidelines: Create and update secure software development lifecycle (SDLC) protocols, ensuring they include best practices for vulnerability prevention. Establish a set of repeatable processes for conducting secure software assessments.
  • Collaborate with Development and Stakeholder Teams: Serve as a liaison between security, development, and operations teams, ensuring shared understanding of application security goals and activities. Incorporate security requirements into development workflows and stakeholder requirements.
  • Monitor Application Threats in Real-Time: Implement baseline measures to monitor frameworks, libraries, and third-party software for vulnerabilities or new security threats. Ensure that vulnerabilities associated with third-party code are identified, assessed, and remediated effectively.
  • Assess and Integrate Emerging Tools and Techniques: Evaluate new application security tools, methods, and frameworks for integration into software development environments to enhance security.
  • Perform Reporting and Communication: Develop comprehensive reports to communicate assessment findings, risks, and remediation steps to stakeholders and leadership in a clear and actionable format. Provide periodic updates and performance metrics on application security initiatives to leadership.

Knowledge, Skills, and Abilities

  • Secure Coding Practices and Standards: Expertise in secure software development methodologies, including OWASP Secure SDLC, OWASP Top 10, and CWE/SANS Top 25 vulnerabilities.
  • Static and Dynamic Application Security Testing (SAST/DAST): Proficient in using and configuring tools like Fortify, SonarQube, OWASP ZAP, Burp Suite, and Checkmarx for vulnerability detection.
  • Application Vulnerability Assessment and Risk Management: Skilled in identifying, analyzing, prioritizing, and remediating software vulnerabilities across various applications and environments.
  • Programming and Framework Expertise: In-depth knowledge of programming languages (e.g., Java, Python, C++, JavaScript) and their associated vulnerabilities, as well as secure coding practices within frameworks like Spring and Django.
  • Leadership and Team Collaboration: Strong ability to lead, mentor, and guide a team of application security specialists, as well as collaborate effectively with development and stakeholder teams.
  • Threat Modeling and Intelligence Integration: Proficient in performing threat modeling, incorporating threat intelligence into assessments, and adapting secure practices to address evolving attack vectors.
  • Compliance and DoD Standards Expertise: Familiarity with DoD frameworks (e.g., DISA STIGs, RMF, FISMA), ensuring software security practices meet federal and organizational compliance requirements.
  • DevSecOps and Automation Proficiency: Skilled in integrating security tools and practices into CI/CD pipelines and using scripting languages (e.g., Python, PowerShell, Bash) for process automation.
  • Effective Communication and Documentation: Ability to clearly communicate technical security risks to non-technical stakeholders and develop comprehensive security procedures, playbooks, and training materials.
  • Continuous Improvement and Emerging Technology Knowledge: Capacity to assess and integrate new tools and techniques into software security operations while staying current with emerging application risks and best practices.

Qualifications

Required Qualifications

  • Minimum of 8 years with BS/BA; Minimum of 6 years with MS/MA; Minimum of 3 years with PhD
  • Must be US Citizen
  • Clearance Requirement: Top Secret
  • CompTIA Security+
  • Certified Information Systems Security Professional (CISSP)

Desired Qualifications

  • Certified Ethical Hacker (CEH)
  • GIAC Certified Incident Handler (GCIH)
  • Certified Secure Software Lifecycle Professional (CSSLP)
  • GIAC Secure Software Programmer (GSSP)
  • GIAC Web Application Penetration Tester (GWAPT)
  • Certified Ethical Hacker (CEH)
  • CompTIA PenTest+:
  • AWS Certified Security – Specialty (or equivalent):
  • GIAC Critical Controls Certification (GCCC):
  • Application and Code Analysis Tool Expertise. Advanced understanding of tools like Veracode, WhiteSource, or Black Duck for software composition analysis (SCA) and third-party library management.
  • Scripting/Programming for Automation. Skills in scripting or programming (e.g., Python, Bash, PowerShell) to develop custom security checks and automate testing workflows.
  • Deep Knowledge of Emerging Threats. Familiarity with new and evolving threats, attack vectors, and mitigation strategies in cutting-edge applications (e.g., mobile apps, microservices, and APIs).
  • Cloud Security and Secure Deployment. Knowledge of securing applications in cloud environments (e.g., AWS, Azure, or Google Cloud) using tools and frameworks like AWS Shield or Azure DevSecOps.
  • Knowledge of Vulnerability Databases. Familiarity with CVEs (Common Vulnerabilities and Exposures) and tools like the NVD (National Vulnerability Database) for identifying known security issues.

Peraton Overview

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world safe and secure.

Target Salary Range

$80,000 - $128,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual’s experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay.

EEO

EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.

About the job

Apply before

Posted on

Job type

Full Time

Experience level

Senior

Salary

Salary: 80k-128k USD

Location requirements

Hiring timezones

United States +/- 0 hours

About Peraton

Learn more about Peraton and their company culture.

View company profile

We are a next-generation national security company, committed to driving missions of consequence that span the globe and extend to the farthest reaches of the galaxy. As a leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and its allies. We operate at the critical nexus between traditional and nontraditional threats, working across all domains: land, sea, space, air, and cyberspace. Our team serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our dedicated employees tackle the 'can't be done,' solving the most daunting challenges that face our customers.

Our approach is built on a foundation of innovation and a culture where every voice matters. We foster collaboration among individuals from diverse backgrounds to address the toughest national security challenges. We believe in celebrating individuality, encouraging growth, and ensuring every team member feels valued and inspired to contribute their unique talents to drive meaningful impact. With a rich heritage spanning over 125 years, we have a legacy of delivering excellence at the speed of the mission. We don't just aim for excellence; we achieve it, as evidenced by numerous industry awards that recognize our innovative solutions and exceptional service. We are passionate about breaking out of silos and looking beyond individual tasks to ensure every component of a mission is in place and performing optimally. For those seeking an impactful career, we offer a unique experience, moving beyond treating applicants as mere numbers. Our commitment extends to our military veterans, who comprise over 20% of our workforce, offering them a place where their service is valued and their professional growth is a priority.

Employee benefits

Learn about the employee benefits and perks provided at Peraton.

View benefits

401(K)

Peraton offers a 401(K) plan.

Pet insurance

Peraton offers pet insurance.

Paid sick days

Peraton provides paid sick days.

Health insurance

Peraton offers health insurance.

View Peraton's employee benefits
Claim this profilePeraton logoPE

Peraton

View company profile

Similar remote jobs

Here are other jobs you might want to apply for.

View all remote jobs

65 remote jobs at Peraton

Explore the variety of open remote roles at Peraton, offering flexible work options across multiple disciplines and skill levels.

View all jobs at Peraton

Remote companies like Peraton

Find your next opportunity by exploring profiles of companies that are similar to Peraton. Compare culture, benefits, and job openings on Himalayas.

View all companies

Find your dream job

Sign up now and join over 100,000 remote workers who receive personalized job alerts, curated job matches, and more for free!

Sign up
Himalayas profile for an example user named Frankie Sullivan
Peraton hiring Secure Software Assessment SME • Remote (Work from Home) | Himalayas