Constrained Cyber Capability Engineer
Johns Hopkins APL · Laurel, MD · Cyber Engineering/Operations
About this role
Johns Hopkins APL is hiring a mid-level Embedded Software Engineer in the software engineering function based in Laurel, MD. The posting calls out experience with TypeScript, Linux, Networking, Security.
- Role
- Embedded Software Engineer
- Function
- software engineering
- Level
- mid
- Track
- Individual contributor
- Location
- Laurel, MD
- Department
- Cyber Engineering/Operations
- Posted
- May 12, 2026
More roles at Johns Hopkins APL
Job description
from Johns Hopkins APL careersAre you searching for impactful work in developing innovative constrained environment cyber capabilities that enable the U.S. to prevail against asymmetric threats?
Do you thrive when solving complex technical challenges at the intersection of software, cyber operations, and wireless communications systems?
Are you eager to integrate, test, and deploy sophisticated offensive cyber capabilities that drive mission impact?
If so, we're looking for someone like you to join our team at APL!
We are seeking a highly motivated Constrained Cyber Capability Engineer to integrate, evaluate, and operationalize adaptive, complex cyber capabilities for real-world operations and environments. You will be part of a multi-disciplinary team of network engineers, reverse engineers, wireless communication engineers, cyber operations experts, and systems engineers working together to deliver ground breaking cyber capabilities to our U.S. Government sponsors.
Our hardworking team values creativity, collaboration, and the open exchange of ideas. New ideas are encouraged, tested, and rapidly transitioned into operational capabilities. We believe in learning, experimenting, professional growth and work-life balance.
As a Constrained Cyber Capability Engineer, you will...
- Contribute to a multi-disciplinary portfolio of projects solving problems in the testing, integration, and operationalization of cyber capabilities that leverage constrained attack surfaces, including networked devices, embedded systems, and wireless communications.