[Close] 

Reverse Engineers

We are seeking junior, mid, and senior-level Reverse Engineers/Vulnerability Research Engineers to support customer/corporate programs.
These engineers will be integral members of a highly-skilled and dynamic team that performs vulnerability research and exploit development.
Main responsibilities will include, but are not limited to:
Analyzing and deconstructing software applications and protocolsIdentifying potential attack vectors of all types and on all platformsTriage, categorization, and analysis of discovered vulnerabilitiesDevelopment of proof of concept (PoC) code for selected vulnerabilitiesRequired Skills/Education:
U.
S.
CitizenshipSecret or Top Secret Clearance requiredBachelor‚EUR(TM)s degree in Engineering, Computer Science or related field (2 years of related experience may be substituted for each year of degree-level education)1-3 years (Junior), 4-7 years (Mid-Level), 8+ years (Senior) of experience in vulnerability research and exploit developmentDemonstrated experience in x86/x64 assembly, software reverse engineering, kernel debugging, networking protocol stacksStrong understanding of desktop operating system (Windows/Linux/Mac) internalsExperience reverse engineering and replicating custom, undocumented protocolsSoftware development experience in Assembly, C, and/or python for development of proof of concept codeKnowledge of hypervisors, anti-virus techniques, disassemblers, and fuzzing frameworksMust present a positive and professional demeanorMust possess excellent communication skills, both written and verbalDesired Skills/Education:
Top secret with SCI eligibility AND PolygraphAdvanced Degree in CS, Mathematics, or EngineeringExperience with mobile operating systemsStrong understanding of mobile operating system (iOS/Android) internalsExperience with reversing and development of non-Intel architectures such as ARM, PowerPC, MIPS, etc.
Experience debugging, reverse engineering, and vulnerability research on non-mobile hardware based platforms

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Sr. Linux Platform Engineer with Security Clea...
Dunn Loring, VA Navstar Inc.
Supervisor, Desktop Engineering with Security ...
Ft Myer, VA Institute for Defense Analyses