Research & Development Specialist (NCWF ID-SP-RD-001)

Conducts software and systems engineering and software systems research in order to develop new capabilities, ensuring cybersecurity is fully integrated. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.


  • Review and validate data mining and data warehousing programs, processes, and requirements
  • Research current technology to understand capabilities of required system or network
  • Identify cyber capabilities strategies for custom hardware and software development based on mission requirements
  • Collaborate with stakeholders to identify and/or develop appropriate solutions technology
  • Design and develop new tools/technologies as related to cybersecurity
  • Evaluate network infrastructure vulnerabilities to enhance capabilities being developed
  • Follow software and systems engineering life cycle standards and processes
  • Troubleshoot prototype design and process issues throughout the product design, development, and pre-launch phases
  • Identify functional- and security-related features to find opportunities for new capability development to exploit or mitigate vulnerabilities
  • Identify and/or develop reverse engineering tools to enhance capabilities and detect vulnerabilities
  • Develop data management capabilities (eg, cloud based, centralized cryptographic key management) to include support to the mobile workforce
  • Research and evaluate available technologies and standards to meet customer requirements


  • Skill in applying and incorporating information technologies into proposed solutions
  • Skill in creating and utilizing mathematical or statistical models
  • Skill in using scientific rules and methods to solve problems
  • Skill in applying the systems engineering process
  • Skill in designing the integration of technology processes and solutions, including legacy systems and modern programming languages
  • Skill in applying secure coding techniques


  • Ability to identify systemic security issues based on the analysis of vulnerability and configuration data
  • Ability to prepare and present briefings
  • Ability to produce technical documentation

Source :