Senior Reverse Engineer
Company: SAIC
Location: Bethesda
Posted on: May 26, 2023
|
|
Job Description:
Description
SAIC's Advanced Technical Exploitation team provides state of the
art technical exploitation and collection capabilities in digital
media exploitation triage and automation, advanced technical Media
Exploitation (MEDEX), and advanced Mobile Device Exploitation.
Activities include digital forensics activities, software reverse
engineering, hardware exploitation, parser development, reverse
engineering, mobile applications development and engineering, and
technical exploitation.
The Advanced Technical Exploitation team offers highly-challenging
and rewarding positions with significant impact on national
security and the opportunity for rapid upward mobility in the areas
of computer forensics/mobile device forensics; data recovery;
reverse engineering; hardware engineering; digital forensic
analysis; and digital and analog electronics. We encourage our team
members to share and grow their skills and expertise while creating
robust and state-of-the-art solutions.
Responsibilities include, but are not limited to (candidates must
have significant experience in several of the following
fields):
Isolate, review, analyze, and reverse-engineer potentially
malicious programs
Write and produce high quality technical reports related to the
scope, nature, and characteristics of the malicious software
suitable for distribution to both technical and non-technical
audiences
Work deep within the boot process, kernel, and system internals to
devise novel solutions using tools like IDA Pro, debuggers, and
in-target probes to examine behavior of binaries
Analyze software and firmware using reverse engineering techniques
to understand security vulnerabilities, working closely with
teammates who value innovation and execution
Share knowledge by clearly articulating ideas through papers and
presentations to technical staff, management and customer decision
makers
Take advantage of opportunities to participate in working groups,
customer meetings, proposal writing, and conferences
Provide detailed understanding of how various attacks work at the
memory and register level
Perform in-depth analysis (dynamic/static) on malicious software
(i.e., bots, worms, Trojans) resident on Microsoft - Windows and
UNlX - based platforms to provide actionable intelligence; as
appropriate, provide remediation recommendations
Analyze, disassemble, and reverse engineer malicious code; document
and transition results in reports, presentations and technical
exchanges
Using existing framework and within design, prototype, document,
test and transition malicious code analysis methods and tools
appropriate for operational use
Proactively identify, define and advocate reverse engineering and
analysis processes, approaches and concepts to enhance/improve
technical exploitation efforts
Adequately explain, present, demonstrate [when applicable] and
document the operational impact of a particular 'vulnerability
Qualifications
TS/SCI with CI Poly is required to perform services on the
contract. Candidates with an active security clearance at the
TS/SCI level are required to pass a counter intelligence
polygraph.
Bachelor of Science degree in Computer Science or Engineering with
at least 20 years' experience; OR
Master of Science in Computer Science or Engineering with at least
18 years' experience; OR
PhD degree in Computer Science or Engineering with at least 15
years' experience.
Two (2) Years' experience with computer forensic software packages
such as EnCase, FTK, or Sleuth Kit/Autopsy
Experience with reverse engineering and network security tools,
including Ida Pro, Immunity Debugger, WinDdg, VIM, Emacs,
Trace32/JTAG, GDB, make, ctags, git, mercurial, and/or Wireshark,
OllyDbg, Ghidra
Experience with either C, C++, VisualBasic, Java, .NET, Delphi,
JavaScript, and Windows Kernel.
Experience in software development and scripting
Thorough understanding of compiler specifics, operating system
concepts, security models, and the causes of most vulnerabilities
and how to exploit them Preferably, experience coding and
disassembling software on both Windows and Linux or other BSD and
Unix variants
Knowledge of the types and techniques of cyber exploitation and
attack, including virus, worm, Trojan horse, logic bomb, and
sniffer to identify, quantify, prioritize, and report
vulnerabilities in enterprise architecture, networks,
communications, applications, and systems
Experience with virtualization, driver programming, diagnosing and
debugging software systems, ethical hacking and/or testing
vulnerabilities
Contractor personnel are required to complete and pass a written
test, prior to beginning work on the contract if they have not
performed customer requirements previously.
Desired:
OSCP or SANS certifications, including (but not limited to): CCNA
Security, CySA+, GICSP, GSEC, Security+ CE, SSCP, CASP CE, CCNP
Security, CISA, GCED, GCIH
Digital forensics certifications including (but not limited to):
EnCE, MCFE,CCME, CCFE,GCFA,GCFE GASF, CCE, or GREM
Covid Policy: SAIC does not require COVID-19 vaccinations or
boosters. Customer site vaccination requirements must be followed
when work is performed at a customer site. REQNUMBER:
2217282-BETHESDA-MD
SAIC is a premier technology integrator, solving our nation's most
complex modernization and systems engineering challenges across the
defense, space, federal civilian, and intelligence markets. Our
robust portfolio of offerings includes high-end solutions in
systems engineering and integration; enterprise IT, including cloud
services; cyber; software; advanced analytics and simulation; and
training. We are a team of 23,000 strong driven by mission, united
purpose, and inspired by opportunity. Headquartered in Reston,
Virginia, SAIC has annual revenues of approximately $6.5 billion.
For more information, visit saic.com. For information on the
benefits SAIC offers, see Working at SAIC. EOE AA
M/F/Vet/Disability
Keywords: SAIC, Bethesda , Senior Reverse Engineer, Engineering , Bethesda, Maryland
Click
here to apply!
|