Reverse Engineer

Key Role:

Provide reverse engineering, static and dynamic binary analysis, and vulnerability analysis of software on a variety of different platforms and operating systems. Write proof-of-concept software that simulates the behavior of analyzed binaries, their interactions with other system components, and validates any discovered vulnerabilities. Author technical documentation of research or findings as it relates to all security mechanisms, including access control, encryption, and obfuscation.

Basic Qualifications:

  • 2+ years of experience with reverse engineering using tools, including Interactive Disassembler (IDA) Pro or Ghidra
  • Experience with programming languages including in C, C++, Python, or Assembly
  • Experience with debugging software
  • Ability to read or write at least one assembly language including x86/x64, ARM, MIPS, or PowerPC
  • Top Secret clearance
  • BA or BS degree

Additional Qualifications:

  • Experience with Linux
  • Experience with forensics analysis of media
  • Experience with analyzing packet captures with tools, including Wireshark
  • Knowledge of cryptographic algorithms and protocols
  • BS in CS, EE, CE, or similar technical field

Clearance:

Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; Top Secret clearance is required.

We’re an EOE that empowers our people—no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, veteran status, or other protected characteristic—to fearlessly drive change.

APC3

Not ready to apply? Join our talent community and sign up for job alerts.