Software Reverse Engineer

Type of Job

Technical

Required Clearance Level

Top Secret/SCI + FSP

Location

Washington, D.C. Metro Area

We're looking for game changers. People who love what they do and who they do it for. Providing consulting services in operational support, intelligence collection, reporting, and data governance, R2C is a leader in delivering solutions for high priority national security concerns. Are you ready for a change?

R2C is seeking Software Reverse Engineers to support a client's technical requirements on a mission focused program within a challenging, dynamic setting located in the Washington Metropolitan Area.

We welcome the most challenging problems facing our national security and apply intellect, talent, and innovation to reach feasible and valuable solutions to each challenge. That means we expect our employees to bring their “A game,” and you have the right to expect the same from the company that employs you. We want to hear your ideas. We want to hear your concerns. We want to make sure you have what you need to do the best you can on the job and grow in your career with us over time. Almost all companies say they have a culture of inclusiveness and that they value employee input, but R2C puts that statement to work every day. It’s time for a change. Come and experience a company that actually cares.

Responsibilities

  • Isolate, review, analyze, reverse-engineer, and modify malicious and non-malicious programs and applications

  • Write and produce technical reports related to the scope, nature, and characteristics of the assessed software and applications suitable for distribution to both technical and non-technical audiences

  • Work deep within the boot process, kernel, and system internals using tools like IDA Pro, debuggers, and in-target probes to research the behavior of binaries

  • Analyze software and firmware using reverse engineering techniques to understand security vulnerabilities

  • Share knowledge by clearly articulating ideas through papers and presentations to technical staff and management

  • Provide detailed understanding of how various software-based attacks work at the memory and register level

  • Perform in-depth analysis on malicious software resident on Microsoft Windows and Linux based platforms

  • Analyze, disassemble, and reverse engineer software binaries

  • Document and transition results in reports, presentations, and technical exchanges

  • Design, prototype, document, test and transition code analysis methods and tools appropriate for operational use

  • Identify, define, and advocate reverse engineering and analysis processes, approaches, and concepts to enhance/improve technical exploitation efforts

  • Identify, define, determine origin and report on malware and other select software found on media of interest

Qualifications

  • Bachelor of Science degree in Computer Science, Software Engineering, Computer Engineering, or Electrical Engineering

  • Experience with reverse engineering and network security tools, including IDA Pro, GDB, WinDdg, YARA, Windows Sysinternals, Kali Linux, and/or Wireshark

  • Programming knowledge/experience with either Windows kernel, C, C++, Python and/or Assembly Language

  • Ability to work in a team environment using modern version control systems

  • Experience in hardware configuration and network/data communications and protocols

  • Experience in software engineering and scripting

  • Experience conducting intelligence analysis and writing finished intelligence reporting

  • Experience requiring a thorough understanding of compiler specifics, operating system concepts, security models, and the causes of most vulnerabilities and how to exploit them

  • Experience coding and dissembling software on both Windows and Linux

  • Experience and knowledge of the types and techniques of cyber exploitation and attack, including virus, worm, Trojan horse, logic bomb, and sniffer to identify, quantify, prioritize, and report vulnerabilities in various architectures, networks, communications, applications, and systems

  • Experience with virtualization, driver programming, and debugging

  • Experience with ethical hacking and/or testing software vulnerabilities

  • Experience with computer forensic software packages

  • DoD 8570 Certification

Preferred Qualifications

  • Familiarity with multiple platforms (Win, Linux, Android, OSX, etc.)

  • Kernel development/debugging experience

  • Strong technical writing skills

  • Experience with virtualization software

  • Strong operating system internals knowledge

  • Experience bypassing technical security protections (packing/DRM/obfuscation)

The Reports and Requirements Company, LLC. (R2C) is proud to be an Affirmative Action/Equal Opportunity Employer and is committed to providing equal employment opportunity for all persons in all facets of employment. All qualified applicants will receive consideration for employment without regard to race, color, religion, age, gender, sexual orientation, gender identity, national origin, citizenship status, marital status, genetic information, disability, protected veteran status or any other legally protected status. If you are an individual with a disability or a disabled veteran and require a reasonable accommodation in applying for any posted position, please contact Human Resources by email at HR@ther2c.com. As a federal government contractor, in accordance with applicable laws, regulations, and Executive Orders, R2C is required to develop annual Affirmative Action Plans (AAPs). Any employees or applicants who wish to review the Affirmative Action Plan (AAP) for Protected Veterans and Individuals with Disabilities can contact us by sending an email to HR@ther2c.com
EEO is the Law. Applicants to and employees of R2C are protected under Federal law from discrimination. Click here to find out more. Pursuant to Executive Order 13665, R2C will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor’s legal duty to furnish information. 41 CFR 60-1.35(c).

1700 N Moore St. 

Suite 2110

Arlington, VA 22209

P: 703-535-5511 • F: 703-997-5515

  • White LinkedIn Icon
  • White Twitter Icon

©  2016 The Reports and Requirements Company, LLC. All Rights Reserved.