Programmer / Application Developer Specialist

Location: Las Vegas, NV
Classification: Contractor / Part-Time / Full-Time (Based on Skill & Project Requirements)
Division: Technical Development & Cyber Operations
Reports To: Director of Technical Services


Overview

Blackthorn Tactical is seeking a highly skilled Programmer / Application Developer Specialist to design, build, and maintain custom software solutions that support our adversarial, defensive, and intelligence-driven operations. This role requires a rare blend of technical depth, creative engineering, and an adversarial mindset capable of developing tools that strengthen real-world security readiness.

As a Program/Application Developer at Blackthorn Tactical, you will assist in building applications used for:

  • Red Team operations

  • Defensive monitoring and analytics

  • Physical and cyber assessment tooling

  • Internal workflow automation

  • Data visualization, reporting, and operational dashboards

  • Secure communication tooling

  • Threat modeling and simulation systems

You will work alongside security consultants, operators, analysts, and leadership to create software that enables our team — and our clients — to move faster, detect earlier, and respond smarter.

This is not a generic software job. You are building tools that help us test, validate, and fortify real-world defenses.


Core Responsibilities

1. Application Development & Engineering

  • Develop secure, scalable applications using Python, C#, JavaScript, Node.js, Go, or similar languages.

  • Build internal tools for adversarial simulation, reconnaissance automation, and defensive monitoring.

  • Create modular, maintainable codebases suitable for long-term operational use.

  • Integrate systems with APIs, databases, cloud services, and internal toolkits.

  • Optimize code performance, reliability, and operational efficiency.


2. Secure Software Development

  • Apply secure coding practices throughout the SDLC.

  • Implement input validation, authentication, and encryption standards.

  • Minimize attack surface, prevent common vulnerabilities, and build resilient architectures.

  • Collaborate with Red/Blue Team staff to test application security and correct potential flaws.


3. Tooling for Security Operations

You may be tasked to design and support:

  • Recon & OSINT automation tools

  • Log analysis & detection engineering utilities

  • Social engineering support tools

  • Physical-security assessment dashboards

  • Data ingestion pipelines for SIEM/XDR

  • Credential auditing / password hygiene tools

  • Incident response reporting automation

  • Internal adversary simulation utilities

These tools support both offensive and defensive operations across cyber, physical, and hybrid environments.


4. Database & Backend Development

  • Design and maintain SQL/NoSQL databases (PostgreSQL, MySQL, MongoDB, Redis).

  • Ensure data integrity, security, and optimized query performance.

  • Build backend APIs to support web applications and client dashboards.


5. Front-End Development (If Applicable)

  • Build clean, responsive UI/UX dashboards using frameworks such as React, Vue, or Svelte.

  • Implement user-friendly data views, maps, charts, reporting panels, and analytics widgets.

  • Maintain UI consistency with Blackthorn Tactical design standards.


6. Cloud, Infrastructure & Deployment

  • Deploy applications to AWS, Azure, GCP, DigitalOcean, or on-prem environments.

  • Implement CI/CD workflow pipelines (GitHub Actions, GitLab CI, Jenkins).

  • Containerize and orchestrate deployments (Docker, Kubernetes).

  • Optimize cloud resources for performance and cost-efficiency.


7. Documentation & Operational Support

  • Document all code, architecture diagrams, and deployment steps.

  • Maintain internal knowledge bases and developer handbooks.

  • Provide post-deployment support and troubleshoot operational issues.

  • Assist with user training when deploying internal tools.


Required Skills & Qualifications

Core Technical Skills

Candidates must be strong in at least 2–3 of the following, with competence in the rest:

  • Programming Languages: Python, Go, C#, JavaScript/Node.js, C++, Java

  • Web Development: HTML5, CSS, REST APIs, modern JS frameworks

  • Secure Coding Practices: OWASP Top 10, SANS CWE, SSDLC

  • Backend Systems: SQL, NoSQL, Cloud databases

  • DevOps: Docker, Kubernetes, CI/CD, Git workflows

  • Cloud Platforms: AWS, Azure, GCP

  • Automation & Scripting: Bash, PowerShell, Python scripting

  • Networking Fundamentals: TCP/IP, DNS, HTTP, firewalls, VPNs


Security Knowledge (Highly Preferred)

  • Understanding of Red Team methodology & adversary TTPs

  • Familiarity with MITRE ATT&CK

  • Experience integrating with SIEM/XDR platforms

  • Knowledge of identity security (MFA, IAM, RBAC)

  • Awareness of secure protocol design & cryptography basics

  • Ability to review logs & detect anomalies

  • Familiarity with breach simulation or threat hunting tooling


Certifications That Strengthen Your Application

Programming & Cloud

  • AWS Certified Developer

  • AWS Solutions Architect

  • Microsoft Azure Developer (AZ-204)

  • Google Professional Cloud Developer

  • CompTIA Cloud+

Cybersecurity & Secure Development

  • CompTIA Security+

  • CompTIA CySA+

  • GIAC GFACT (Foundational cybersecurity knowledge)

  • GIAC GWEB (Secure web application development)

  • GIAC GCSA (Cloud Security Automation)

  • GIAC GPEN / GXPN (for offensive tooling developers)

  • OSWE (Offensive Web Exploitation – advanced dev-sec)

  • CSSLP (Secure Software Lifecycle Professional)

Bonus Certifications (for niche capabilities)

  • CEH (practical attacker knowledge)

  • OSCP (offensive mindset integration)

  • CCSK / CCSP (cloud security)

No single certification is required — you will be evaluated on your actual technical ability, not your paperwork.


Soft Skills & Professional Traits

  • Ability to work independently with minimal oversight

  • Strong analytical and problem-solving abilities

  • Attention to detail and passion for quality

  • Ability to communicate complex technical concepts simply

  • Creative problem-solving mindset

  • Adaptability and willingness to learn new technologies

  • Ethical judgment, professionalism, and confidentiality


Tools & Technologies You May Use

  • Frameworks: Flask, Django, FastAPI, Express, .NET

  • UI Libraries: React, Vue, Tailwind, D3.js

  • Data Tools: ElasticSearch, Splunk, Grafana

  • Automation: Celery, Airflow, Cron, Terraform

  • DevOps: GitHub Actions, GitLab CI, Jenkins, ArgoCD

  • APIs: Google Maps API, Twilio, Slack, Microsoft Graph

  • Testing: PyTest, Postman, Selenium, Burp Suite integration

(We don’t expect you to know all of these — but you should be eager to learn.)


What Success Looks Like in This Role

You will excel if you:

  • Build tools that extend our operational capability

  • Demonstrate reliability, ownership, and initiative

  • Create code that is clean, documented, and maintainable

  • Understand how attackers think — and build defensively

  • Collaborate with both developers and operators

  • Provide solutions that solve real security problems

  • Can rapidly prototype and iterate under pressure

This role directly strengthens our ability to deliver elite security consulting.


Eligibility Requirements

  • Must pass background screening

  • Must be legally able to work in the U.S.

  • Must sign NDA & confidentiality agreements

  • Must comply with all legal & ethical standards

  • Experience working in sensitive environments is a plus

Submit Resume