Software Reverse Engineer (Mid-Level)

Bethesda, MD

Job ID: 125016 Industry: Government


Candidate MUST HAVE a TS/SCI AND Polygraph in order to be considered

Program / Project Description:

The mission of the contract is to provide the customer with computer forensic and exploitation mitigation of the systems that have been effected by malicious and nefarious software virus attacks.   They are  looking to add another large group of Software Reverse Engineers, Hardware Engineers and Mobile Software Engineers on a team of Forensic Engineers as soon as possible.


Day to Day Responsibilities:
  • In providing computer forensics support, the candidate shall provide some or all of services as required:
  • Isolate, review, analyze, and reverse-engineer potentially malicious programs
  • Write and produce high quality technical reports related to the scope, nature, and characteristics of the malicious software suitable for distribution to both technical and non-technical audiences
  • Work deep within the boot process, kernel, and system internals to devise novel solutions using tools like IDA Pro, debuggers, and in-target probes to examine behavior of binaries
  • Analyze software and firmware using reverse engineering techniques to understand security vulnerabilities, working closely with teammates who value innovation and execution
  • Share knowledge by clearly articulating ideas through papers and presentations to technical staff, management and customer decision makers
  • Take advantage of opportunities to participate in working groups, customer meetings, proposal writing, and conferences
  • Provide detailed understanding of how various attacks work at the memory and register level
  • Perform in-depth analysis (dynamic/static) on malicious software (i.e., bots, worms, Trojans) resident on Microsoft® Windows and UNIX® based platforms to provide actionable intelligence; as appropriate, provide remediation recommendations
  • Analyze, disassemble, and reverse engineer malicious code; document and transition results in reports, presentations and technical exchanges
  • Using existing framework and within design, prototype, document, test and transition malicious code analysis methods and tools appropriate for operational use
  • Proactively identify, define and advocate reverse engineering and analysis processes, approaches and concepts to enhance/improve technical exploitation efforts
  • Adequately explain, present, demonstrate [when applicable] and document the operational impact of a particular vulnerability


  • BS degree in Computer Science, Software Engineering, Computer Engineering or Electrical Engineering and at least 4 years of post-baccalaureate experience
  • Working experience with reverse engineering and network security tools, including Ida Pro, Immunity Debug, WinDdg, VIM, Emacs, Trace32/JTAG, GDB, make, ctags, git, mercurial, and/or Wireshark
  • Working level Programming knowledge/experience with either Windows Kernel, C, C++, Python or Java, or .NET or Assembly Language and the ability to work in a team environment
  • Experience in hardware configuration and network/data communications
  • Experience in software development and scripting
  • Experience conducting intelligence analysis and writing finished intelligence reporting with high quality and with minimal revision
  • Experience with networking protocols and concepts


  • Ability to translate functional security requirements into secure design technical and operational specifications and develop secure design specifications using secure tools and methodologies
  • Ability to establish defense mechanisms to detect and deflect Cyberattacks on networks and communications systems and structures and design and evaluate applications that are secure from known and potential methods of Cyberattack
  • Ability to coordinate systems implementation activities with key personnel to ensure the successful transition from development to implementation and operation, present and defend a position, and to communicate with government and subcontractor team members
  • Thorough understanding of compiler specifics, operating system concepts, security models, and the causes of most vulnerabilities and how to exploit them Preferably, .experience coding and disassembling software on both Windows and Linux or other *BSD and Unix variants
  • Previous experience with ethical hacking and/or testing vulnerabilities
  • Advanced/Expert experience with diagnosing and debugging software systems
  • Working knowledge of the types and techniques of cyber exploitation and attack, including virus, worm, Trojan horse, logic bomb, and sniffer to identify, quantify, prioritize, and report vulnerabilities in enterprise architecture, networks, communications, applications, and systems
  • Candidate may have Industry standard EnCE, and ACE, or CCE, or GIAC forensic certifications

Job Type: Full Time  

Not ready to apply?

Send an email reminder to:

Share This Job:

Related Jobs: