The candidate will be primarily focused on conducting software Reverse Engineering activities using a combination of static and dynamic tools.
Must be a US Citizen with a TOP SECRET security clearance (no exceptions)
Preferred degree in Computer Engineering, Computer Science, Math or closely related degree trek
Advanced Experience in computer engineering or a related field with in-depth knowledge of software reverse engineering and/or software development.
Experience with x86 and x64 Assembly, C, and C++
Experience using static analysis tools such as IDA Pro and dynamic analysis tools including debuggers.
Proficiency in Windows OS Internals and API's.
Excellent customer service and communication skills as well as the ability to prioritize and meet deadlines.
Strong leadership interpersonal and verbal/written communications skills that enable the ability to work effectively in a collaborative team environment.
* Must be 8570 IAT compliant at Levels II or III. Any of the following certifications for these levels will be accepted: CCNA Security, CySA+, GICSP, GSEC, Security+ CE, SSCP, CASP CE, CCNP Security, CISA, CISSP (or Associate), GCED, GCIH.
Proficiency in development for IDA Pro
Experience with reversing ARM
At Cipher Tech Solutions, Inc. (Cipher Tech), we take great pride in supporting some of the most mission critical work in the Department of Defense and the Intelligence Community. The majority of our company is comprised of extremely talented software developers who write production tools which directly support one of two missions: digital forensics and malware reverse engineering.
Digital forensics is the practice of extracting and processing evidence from computers, phones, tablets, cameras, flash-drives, and just about any other form of digital media. The results of our work are then used to support federal and military law enforcement, counter intelligence, and counter terrorist activities.
Malware reverse engineering is the practice of analyzing extremely advanced malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as:
How did it infect the victim's computer
What kind of information it is seeking to steal
How is it communicating with the author (actor)
Who that actor might be
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity or national origin.