Cipher Tech Solutions
  • 11-Jul-2017 to 02-Nov-2017 (EST)
  • Engineering
  • Bethesda, MD, USA
  • Hourly
  • Full Time

Location

Bethesda, MD

Description 

The candidate will be primarily focused on conducting software Reverse Engineering activities using a combination of static and dynamic tools.

Requirements

Must be a US Citizen with a TOP SECRET security clearance (no exceptions)

Preferred degree in Computer Engineering, Computer Science, Math or closely related degree trek

Advanced Experience in computer engineering or a related field with in-depth knowledge of software reverse engineering and/or software development.

Experience with x86 and x64 Assembly, C, and C++

Experience using static analysis tools such as IDA Pro and dynamic analysis tools including debuggers.

Proficiency in Windows OS Internals and API's.

Excellent customer service and communication skills as well as the ability to prioritize and meet deadlines.

Strong leadership interpersonal and verbal/written communications skills that enable the ability to work effectively in a collaborative team environment. 

 Desirable

Proficiency in development for IDA Pro

Experience with reversing ARM

 

About Us

At Cipher Tech Solutions, Inc. (Cipher Tech), we take great pride in supporting some of the most mission critical work in the Department of Defense and the Intelligence Community. The majority of our company is comprised of extremely talented software developers who write production tools which directly support one of two missions: digital forensics and malware reverse engineering.

Digital forensics is the practice of extracting and processing evidence from computers, phones, tablets, cameras, flash-drives, and just about any other form of digital media. The results of our work are then used to support federal and military law enforcement, counter intelligence, and counter terrorist activities.

Malware reverse engineering is the practice of analyzing extremely advanced malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as:

How did it infect the victim's computer

What kind of information it is seeking to steal

How is it communicating with the author (actor)

Who that actor might be

Cipher Tech Solutions
  • Apply Now

  • * Fields Are Required

    What is your full name?

    How can we contact you?

    By clicking the button above, I agree to ApplicantPro's Applicant Information Use Policy.

  • Sign Up For Job Alerts!

  • Share this Page
  • Facebook Twitter LinkedIn Email
.
Logo Home The Company Services&Solutions Careers Contact Us