Principal Software Developer

Category
Recruiting
Company
ACES

Who We Are

ACES is the recognized DoD365 solutions expert by DoD CIO and Microsoft. ACES built the case for the DoD CIO to transition the department to DoD365 and when the USAF Headquarters volunteered to be the first in DoD to transition to DoD365, ACES was their sole-source choice to architect their DoD365 environment and transition them into it. ACES has developed many of the DoD365 best practices and has consistently architected and implemented DoD-wide enterprise solutions using the DoD365 environment. ACES has been contracted by DoD CIO since the inception of the company and has recently architected and maintains some of the most important DoD-wide enterprise data repositories that track modernization for Command, Control, and Communications (C3), Tactical Communications, SATCOM, Public Safety Communications, and more.

Who You Are

Secret Clearance | Active IAT-III Certification | Bachelor's Degree | 10 Yrs Experience |

 

ACES is seeking a Principal Software Developer to oversee the software development lifecycle, ensuring software solutions comply with Department of Defense (DoD) policies. This senior-level role demands leadership in defining software requirements, directing technical and operational projects, integrating security protocols, and promoting innovation and efficiency throughout development processes

What You'll Do

· Support rigorous processes to ensure software products meet or exceed command requirements.

· Verify that team members handling sensitive information possess necessary security clearances and adhere to access control policies.

· Maintain thorough documentation of software programs and provide regular project status reports to DoD leadership.

· Oversee the entire software development life cycle, ensuring compliance with DoD policies from concept through deployment.

· Design and develop software systems for interoperability with other DoD systems.

· Develop and maintain cybersecurity preparedness plans, including response strategies for potential cyber threats and incidents.

· Foster a culture of continuous improvement, encouraging innovation and efficiency in software development processes.

· Develop and communicate a comprehensive strategy for integrating security into the software development and operations lifecycle.

· Evaluate, select, and integrate security tools within the development and operations toolchain to automate security processes.

· Conduct or oversee threat modeling to identify and mitigate potential security risks throughout the software development lifecycle.

· Develop and maintain an incident response plan and ensure timely and effective response to security incidents.

· Implement continuous monitoring processes to detect and respond to security threats in real-time.

· Promote and enforce secure coding practices within development teams.

· Oversee identification, assessment, and remediation of software vulnerabilities.

· Integrate security checks into CI/CD pipelines to detect vulnerabilities early in the development process.

· Define, track, and report on key security metrics, providing regular updates to leadership regarding security initiatives and improvements.

· Stay informed of evolving security threats, vulnerabilities, and industry best practices to continually enhance organizational security posture.

What You Bring

· Certifications: Active IAT-III Certification (CASP+CE, CCNP Security, CISA, CISSP or Associate, GCED, GCIH, CCSP)

· Education/Experience: Bachelor’s degree in Information Technology, Computer Science, or an equivalent technical degree from an accredited college or university, and fifteen (15) years’ relevant experience leading technical and operational projects, including at least five (5) years of software management or software development experience.

· Technical: Extensive experience managing rigorous software development processes, security integration, and lifecycle oversight.

·Expertise in cybersecurity preparedness, threat modeling, continuous monitoring, and secure coding practices.

·Adept in integrating security checks within continuous integration and continuous deployment (CI/CD) pipelines to ensure early detection and remediation of vulnerabilities.

What We Offer

We offer a competitive compensation and benefits package! 

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed