This job board retrieves part of its jobs from: Toronto Jobs | Emplois Montréal | IT Jobs Canada

Find jobs in Maryland today!

To post a job, login or create an account |  Post a Job

  Jobs in Maryland  

Bringing the best, highest paying job offers near you

previous arrow
next arrow

Software Reverse Engineer – Mid


This is a Full-time position in Bethesda, MD posted December 2, 2020.

OverviewBluehawk is looking for a Software Reverse Engineer
– Mid Level to work in Bethesda, MD or Reston, VA.ResponsibilitiesIn providing Software Reverse Engineering support, the Contractor shall providesome or all of services as required:* Isolate, review, analyze, reverse-engineer, and modify malicious and nonmaliciousprograms and applications.* Write and produce technical reports related to the scope, nature, andcharacteristics of assessed software and applications suitable for distribution to bothtechnical and non-technical audiences.* Work deep within the boot process, kernel, and system internals using toolslike IDA Pro, debuggers, and in-target probes to research the behavior of binaries.* Analyze software and firmware using reverse engineering techniques tounderstand security vulnerabilities, working closely with teammates who valueinnovation and execution.* Share knowledge by clearly articulating ideas through papers andpresentations to technical staff, management and Government decision makers.* With COR approval participate in working groups, sponsor meetings,proposal writing, and conferences.* Provide detailed understanding of how various software-based attacks workat the memory and register level.* Perform in-depth analysis (dynamic/static) on malicious software (i.e., bots,worms, Trojans) resident on Microsoft® WindowsTM and Linux based platforms toprovide actionable intelligence and, as appropriate, provide remediationrecommendations.* Analyze, disassemble, and reverse engineer software binaries; document andtransition results in reports, presentations and technical exchanges.* Design, prototype, document, test and transition code analysis methods andtools appropriate for operational use.* Pro-actively identify, define and advocate reverse engineering and analysisprocesses, approaches and concepts to enhance/improve technical exploitationefforts.* Adequately explain, present, demonstrate (when applicable) and documentthe operational impact of a particular vulnerability.* Identify, define, determine origin and report on malware and other selectsoftware found on media of interest.QualificationsContractor personnel assigned must have the followingqualifications:* Must have Bachelors of Science degree in Computer Science, SoftwareEngineering, Computer Engineering, or Electrical Engineering and at least four (4)years of related experience.

A Master of Science in Computer Science, SoftwareEngineering, Computer Engineering, or Electrical Engineering may be substitutedfor two (2) years of required experience.

A PhD degree in Computer Science,Software Engineering, Computer Engineering, or Electrical Engineering may besubstituted for three (3) years of required experience.* Working experience with reverse engineering and network security tools,including IDA Pro, GDB, WinDdg, YARA, Windows Sysinternals, Kali Linux,and/or Wireshark.* Working level Programming knowledge/experience with either WindowsKernel, C, C++, Python and/or Assembly Language and the ability to work in ateam environment using modern version control systems.* Working level experience in hardware configuration and network/datacommunications and protocols.* Working level experience in software engineering and scripting.* Working level experience conducting intelligence analysis and writingfinished intelligence reporting.* Thorough experience/understanding of compiler specifics, operating systemconcepts, security models, and the causes of most vulnerabilities and how to exploitthem.

Preferably, experience coding and disassembling software on both Windows andLinux or other *BSD and Unix variants.* Working experience/knowledge of the types and techniques of cyberexploitation and attack, including virus, worm, Trojan horse, logic bomb, andsniffer to identify, quantify, prioritize, and report vulnerabilities in variousarchitectures, networks, communications, applications, and systems.* Experience establishing defense mechanisms to detect and deflect Cyberattackson networks and communications systems and structures and designing andevaluating applications that are secure from known and potential methods of Cyberattack.* Experience coordinating systems implementation activities with keypersonnel to ensure the successful transition from development to implementationand operation, presenting and defending a position, and to communicating withgovernment and contractor team members.* Experience with virtualization, driver programming, and debugging.* Experience with ethical hacking and/or testing software vulnerabilities.* Experience with diagnosing and debugging software systems.* Contractor personnel may have Industry standard EnCE, and ACE, or CCE, orGIAC forensic certifications* Some of these requirements may be waived by the government.* Contractor personnel shall be required to complete and pass a written test, prior tobeginning work on the contract.Bluehawk, LLC.

is an Equal Opportunity/Affirmative Action Employer//EOE Minority/Female/Disabled/Veteran/Sexual Orientation/Gender Identity/

AL Jobs AR Jobs CA Jobs GA Jobs KS Jobs KY Jobs LA Jobs MD Jobs MI Jobs MN Jobs MS Jobs MO Jobs NY Jobs OR Jobs TN Jobs TX Jobs UT Jobs VA Jobs WV Jobs ID Jobs