JOIN THE TEAM TODAY!

Our reputation is built on the skills and successes of our employees.

Computer Forensic & Intrusion Analyst - Senior (Software Reverse Engineer)

Learn more about this opportunity below: REQ ID: 5944 DC3III - Computer Forensic & Intrusion Analyst - Senior (Software Reverse Engineer)
Clearance: TS/SCI FSP

Work Location: Bethesda

Description

Required Skills:

• TS/SCI w/ CI Poly

• DoD 8570 compliance - any Tier 2 certificate at time of start (https://public.cyber.mil/cw/cwmp/dod-approved-8570-baseline-certifications/)

• Advanced/Expert experience with reverse engineering and network security tools, including IDA Pro, GDB, WinDdg, YARA, Windows Sysinternals, Kali, Linux and/or Wireshark

• Expert level programming knowledge/experience with either Windows Kernel, C, C++, Python and/or Assembly Language and the ability to work in a team environment using modern version control systems

• Advanced/Expert level experience in hardware configuration and network/data communications and protocols

• Advanced/Expert level experience in software development and scripting

• Advanced/Expert level experience conducting intelligence analysis and writing finished intelligence reporting

• Experience requiring a thorough understanding of compiler specifics, operation system concepts, security models and causes of most vulnerabilities and how to exploit them. Preferably experience coding and disassembling software on both Windows and Linux or other BSD and Unix variants

• Advanced/Expert experience and knowledge of the types and techniques of cyber exploitation and attack, including virus, worm, trojan horse, logic bomb, and sniffer to identify, quantify, prioritize, and report vulnerabilities in various architectures, networks, communications, applications, and systems

• Experience establishing defense mechanisms to detect and deflect cyber attacks on networks and communications systems and structures and designing and evaluating applications that are secure from known and potential methods of cyber attack

• Experience coordinating systems implementation activities with key personnel to ensure the successful transition from development to implementation and operation present and defend a position and to communicate with government and contractor team members

• Experience with virtualization, driver programming and debugging

• Experience with ethical hacking and/or testing software vulnerabilities

 

Desired Skills:

• Advanced/Expert experience with diagnosing and debugging software systems

• Contractor may have experience with computer forensic software packages such as EnCase, FTK, or Sleuth Kit / Autopsy

 

Description: This role is for a Software Reverse Engineer.

 

Role: Supporting NMEC’s Software Reverse Engineering (SRE) team in analyzing executable files to determine functionality and captured data to facilitate further analysis of Captured Exploitable Media (CEM) submitted to NMEC for exploitation. Windows x86 and Android APK executables represent the majority of relevant file types to be analyzed, however iOS and Linux-based executables are also present among NMEC’s holdings. Qualified candidates will have experience in reversing programs and applications using standard COTS tools such as OllyDbg and/or IDA Pro. SRE personnel work in close collaboration with other technical sections and create written reports on the outcome of their analysis.

 

Duties:

• Isolate, review, analyze, reverse-engineer, and modify malicious and non-malicious programs and applications

• Write and produce technical reports related to the scope, nature, and characteristics of the assessed software and applications suitable for distribution to both technical and non-technical audiences

• Work deep within the boot-process kernel and system internals using tools like IDA Pro, debuggers, and in-target probes to research the behavior of binaries

• Analyze software and firmware using reverse engineering techniques to understand security vulnerabilities, working closely with teammates who value innovation and execution

• Share knowledge by clearly articulation ideas through papers and presentation to technical staff, management and Government decision makers

• With COR approval, participate in working groups, sponsor meetings, proposal writing and conferences

• Provide detailed understanding of how various software-based attacks work at the memory and register level

•Perform in-depth analysis (dynamic/static) on malicious software (ie: bots, worms, trojans) resident on Microsoft Windows and Linux-based platforms to provide actionable intelligence and, as appropriate, provide remediation recommendations

• Analyze, disassemble and reverse engineer software binaries; document and transition results in reports, presentations and technical exchanges

• Design, prototype, document, test and transition code analysis methods and tools appropriate for operational use

• Proactively identify, define and advocate reverse engineering and analysis processes, approaches, and concepts to enhance/improve technical exploitation efforts

• Adequately explain, present, demonstrate (when applicable) and document the operational impact of a particular vulnerability

• Identify, define, determine origin and report on malware and other select software found on media of interest

Job Application

Fill out our application below and we will contact you at our earliest convenience.

arrow&v
Place Resume Here
Max File Size 15MB
About Us
2-CM Technologies, LLC’s mission is to provide our customers with exceptional Information Technology support, solutions and services that exceed their expectations.
Contacting Us

 

Office:  410-530-7563

Email: recruiting@2cmtechnologies.com

Newsletter

 

Sign up to our newsletter and be the first to know about latest news, special offers, events, and new positions.

© 2019 by 2-CM Technologies, LLC