Programmer / Application Developer Specialist
Location: Las Vegas, NV
Classification: Contractor / Part-Time / Full-Time (Based on Skill & Project Requirements)
Division: Technical Development & Cyber Operations
Reports To: Director of Technical Services
Overview
Blackthorn Tactical is seeking a highly skilled Programmer / Application Developer Specialist to design, build, and maintain custom software solutions that support our adversarial, defensive, and intelligence-driven operations. This role requires a rare blend of technical depth, creative engineering, and an adversarial mindset capable of developing tools that strengthen real-world security readiness.
As a Program/Application Developer at Blackthorn Tactical, you will assist in building applications used for:
-
Red Team operations
-
Defensive monitoring and analytics
-
Physical and cyber assessment tooling
-
Internal workflow automation
-
Data visualization, reporting, and operational dashboards
-
Secure communication tooling
-
Threat modeling and simulation systems
You will work alongside security consultants, operators, analysts, and leadership to create software that enables our team — and our clients — to move faster, detect earlier, and respond smarter.
This is not a generic software job. You are building tools that help us test, validate, and fortify real-world defenses.
Core Responsibilities
1. Application Development & Engineering
-
Develop secure, scalable applications using Python, C#, JavaScript, Node.js, Go, or similar languages.
-
Build internal tools for adversarial simulation, reconnaissance automation, and defensive monitoring.
-
Create modular, maintainable codebases suitable for long-term operational use.
-
Integrate systems with APIs, databases, cloud services, and internal toolkits.
-
Optimize code performance, reliability, and operational efficiency.
2. Secure Software Development
-
Apply secure coding practices throughout the SDLC.
-
Implement input validation, authentication, and encryption standards.
-
Minimize attack surface, prevent common vulnerabilities, and build resilient architectures.
-
Collaborate with Red/Blue Team staff to test application security and correct potential flaws.
3. Tooling for Security Operations
You may be tasked to design and support:
-
Recon & OSINT automation tools
-
Log analysis & detection engineering utilities
-
Social engineering support tools
-
Physical-security assessment dashboards
-
Data ingestion pipelines for SIEM/XDR
-
Credential auditing / password hygiene tools
-
Incident response reporting automation
-
Internal adversary simulation utilities
These tools support both offensive and defensive operations across cyber, physical, and hybrid environments.
4. Database & Backend Development
-
Design and maintain SQL/NoSQL databases (PostgreSQL, MySQL, MongoDB, Redis).
-
Ensure data integrity, security, and optimized query performance.
-
Build backend APIs to support web applications and client dashboards.
5. Front-End Development (If Applicable)
-
Build clean, responsive UI/UX dashboards using frameworks such as React, Vue, or Svelte.
-
Implement user-friendly data views, maps, charts, reporting panels, and analytics widgets.
-
Maintain UI consistency with Blackthorn Tactical design standards.
6. Cloud, Infrastructure & Deployment
-
Deploy applications to AWS, Azure, GCP, DigitalOcean, or on-prem environments.
-
Implement CI/CD workflow pipelines (GitHub Actions, GitLab CI, Jenkins).
-
Containerize and orchestrate deployments (Docker, Kubernetes).
-
Optimize cloud resources for performance and cost-efficiency.
7. Documentation & Operational Support
-
Document all code, architecture diagrams, and deployment steps.
-
Maintain internal knowledge bases and developer handbooks.
-
Provide post-deployment support and troubleshoot operational issues.
-
Assist with user training when deploying internal tools.
Required Skills & Qualifications
Core Technical Skills
Candidates must be strong in at least 2–3 of the following, with competence in the rest:
-
Programming Languages: Python, Go, C#, JavaScript/Node.js, C++, Java
-
Web Development: HTML5, CSS, REST APIs, modern JS frameworks
-
Secure Coding Practices: OWASP Top 10, SANS CWE, SSDLC
-
Backend Systems: SQL, NoSQL, Cloud databases
-
DevOps: Docker, Kubernetes, CI/CD, Git workflows
-
Cloud Platforms: AWS, Azure, GCP
-
Automation & Scripting: Bash, PowerShell, Python scripting
-
Networking Fundamentals: TCP/IP, DNS, HTTP, firewalls, VPNs
Security Knowledge (Highly Preferred)
-
Understanding of Red Team methodology & adversary TTPs
-
Familiarity with MITRE ATT&CK
-
Experience integrating with SIEM/XDR platforms
-
Knowledge of identity security (MFA, IAM, RBAC)
-
Awareness of secure protocol design & cryptography basics
-
Ability to review logs & detect anomalies
-
Familiarity with breach simulation or threat hunting tooling
Certifications That Strengthen Your Application
Programming & Cloud
-
AWS Certified Developer
-
AWS Solutions Architect
-
Microsoft Azure Developer (AZ-204)
-
Google Professional Cloud Developer
-
CompTIA Cloud+
Cybersecurity & Secure Development
-
CompTIA Security+
-
CompTIA CySA+
-
GIAC GFACT (Foundational cybersecurity knowledge)
-
GIAC GWEB (Secure web application development)
-
GIAC GCSA (Cloud Security Automation)
-
GIAC GPEN / GXPN (for offensive tooling developers)
-
OSWE (Offensive Web Exploitation – advanced dev-sec)
-
CSSLP (Secure Software Lifecycle Professional)
Bonus Certifications (for niche capabilities)
-
CEH (practical attacker knowledge)
-
OSCP (offensive mindset integration)
-
CCSK / CCSP (cloud security)
No single certification is required — you will be evaluated on your actual technical ability, not your paperwork.
Soft Skills & Professional Traits
-
Ability to work independently with minimal oversight
-
Strong analytical and problem-solving abilities
-
Attention to detail and passion for quality
-
Ability to communicate complex technical concepts simply
-
Creative problem-solving mindset
-
Adaptability and willingness to learn new technologies
-
Ethical judgment, professionalism, and confidentiality
Tools & Technologies You May Use
-
Frameworks: Flask, Django, FastAPI, Express, .NET
-
UI Libraries: React, Vue, Tailwind, D3.js
-
Data Tools: ElasticSearch, Splunk, Grafana
-
Automation: Celery, Airflow, Cron, Terraform
-
DevOps: GitHub Actions, GitLab CI, Jenkins, ArgoCD
-
APIs: Google Maps API, Twilio, Slack, Microsoft Graph
-
Testing: PyTest, Postman, Selenium, Burp Suite integration
(We don’t expect you to know all of these — but you should be eager to learn.)
What Success Looks Like in This Role
You will excel if you:
-
Build tools that extend our operational capability
-
Demonstrate reliability, ownership, and initiative
-
Create code that is clean, documented, and maintainable
-
Understand how attackers think — and build defensively
-
Collaborate with both developers and operators
-
Provide solutions that solve real security problems
-
Can rapidly prototype and iterate under pressure
This role directly strengthens our ability to deliver elite security consulting.
Eligibility Requirements
-
Must pass background screening
-
Must be legally able to work in the U.S.
-
Must sign NDA & confidentiality agreements
-
Must comply with all legal & ethical standards
-
Experience working in sensitive environments is a plus
