Software Reverse Engineer

Location: Fort Meade, Maryland, United States
Date Posted: 08-18-2017

1.  Eleven (11) years experience in software development and maintenance (i.e. software requirements analysis and software design including object oriented analysis and design, coding, testing, documentation, configuration management, user training, deployment, and lifecycle maintenance.)  
2.  Documented formal training on the Software Engineering Institute (SEI) Capability Maturity Model Integration for Development (CMMI-DEV) model or documented experience working on projects that applied some portions of this model. 
3.  Documented formal training on DOD standards for software testing and documentation or documented experience working on projects that applied these standards

Electrical/Computer/Software Engineering, Computer Science, Math or Information System

Software reverse engineers will perform triage, categorize, and analyze discovered vulnerabilities. You will have the opportunity to perform traditional RE and vulnerability research with a focus on OCO (Offensive Cyber Operations) and DCO (Defensive Cyber Operations) activities. The feasibility and impact of the findings will often require team members to develop prototype exploitations based on identified vulnerabilities. 

  • 7+ years in software development and maintenance
  • 3+ years in malware analysis and mitigation techniques
  • Experience in Software Reverse Engineering.
  • Bachelor’s Degree in Computer Science/Engineering or related field
  • An Active Secret Clearance
·        Experience in x86/x64 assembly, software reverse engineering, kernel debugging, and protocol stacks.
·        Computer implant architecture and development 
·        Software reverse engineering tools: IDAPro, GDB, WinDbg, Immunity/OllyDbg
·        Strong understanding of the Windows and Linux Operating System internals and APIs.
·        Experience analyzing shellcode, packed and obfuscated and the associated algorithms.
·        Experience with Python scripting to automate analysis and RE tasks.
·        Experience developing computer exploits
·        Experience in host and network analysis to identify and characterize anomalies and vulnerabilities in the platform
·        Experience documenting findings in reports and briefings
·        Applicable security certifications: CISSP, C|EH, CREA, GPEN, GREM, OSCP, OSCE
this job portal is powered by CATS