This site uses cookies. To find out more, see our Cookies Policy

Cyber Reverse Engineer in Wright-Patterson Air Force Base, OH at Booz Allen Hamilton Inc.

Date Posted: 11/28/2018

Job Snapshot

Job Description

Job Number: R0043237

Cyber Reverse Engineer

The Challenge:

What if you could use your engineering skills to transform the Air Force’s ability to perform reverse engineering? As a Cyber engineer, you understand the power behind complex systems. That knowledge is key when it comes to applying technical knowledge of software to perform reverse engineering, including using both static and dynamic analysis techniques to discover vulnerabilities in binary applications or source code.  We’re looking for an engineer who can use their skills to improve our nation’s security and intelligence mission. You will use information learned during analyses to modify existing tools to build a proof of concept to verify the vulnerability when possible. You will document all discoveries and present them to the client, including giving a briefing or demo, as needed. This position will require frequent client interaction and is located at a client site.  

Our team performs engineering modeling and simulation, including reverse engineering and leveraging comprehension of hardware, including radar and digital signal processing. That’s why we need you, an engineering with a solid background in reverse engineering to help us with reverse engineering, including the development of new tools that identity vulnerabilities. You’ll work alongside a customer located at Wright-Patterson Air Force Base to directly impact the Air Force’s security and intelligence missions. This is a chance to use your reverse engineering, electrical engineering, and programming skills while gaining experience in classified systems. Join us and take on exciting challenges as we support and improve warfighter security and survivability.

Empower change with us.

Build Your Career:

When you join Booz Allen, you’ll have the opportunity to connect with other professionals doing similar work across multiple markets. You’ll share best practices and work through challenges as you gain experience and mentoring to develop your career. In addition, you will have access to a wealth of training resources through our Engineering & Science University, an online learning portal where you can access more than 5000 tech courses, certifications and books. Build your technical skills through hands-on training on the latest tools and tech from our in-house experts. Pursuing certifications? Take advantage of our tuition assistance, on-site courses, vendor relationships, and a network of experts who can give you helpful tips. We’ll help you develop the career you want as you chart your own course for success.

You Have:

-2+ years of experience with programming, including Python, C, C++, and Assembly

-Experience with performing reverse engineering and vulnerability analysis of software binaries using IDA Pro

-Experience with working in Windows or Linux environments

-Secret clearance

-BS degree in CS, Computer Engineering, or Electrical Engineering

Nice If You Have:

-Experience in working with debuggers, including GDB, Olly Dbg, or Immunity

-Experience in working with a disassembler, including IDA Pro, Ghidra, or Binary Ninja

-Experience with working in virtualized environments

-TS/SCI clearance preferred

Clearance:
Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; Secret clearance is required.

We’re an EOE that empowers our people—no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, or veteran status—to fearlessly drive change.

Your Career is Waiting.

Get job alerts. Learn about new work and upcoming events. Share open roles with friends and colleagues.
Our Talent Network is your opportunity hub.


Get Answers and Access.

Need more information? Find it in our FAQs.

Application already in-process? Log in to keep going.