Unrivaled Dedication to The Craft

Reverse Engineer and Vulnerability Research Subject Matter Expert


Reverse Engineer and Vulnerability Research Subject Matter Expert

310 S. Saint Mary's Street
San Antonio, TX 78205

Functional Responsibilities

  • Analyze dynamic/static software and hardware systems; using disassembling toolkits.
  • Perform behavioral and code analysis.
  • Examine protected or packaged executables
  • Patch compiled executables
  • Analyze malware designed to use encryption, hashing, obfuscation, stealthy functionality, specific targeting and initiate time-triggered attacks.
  • Analyze, enhance, and demonstrate patches, countermeasures and defensive solutions for malicious logic, exploits and attack vectors as determined by government.
  • Track analysis of potential vulnerabilities and proofs-of-concept developed. Familiar with vulnerability disclosure procedures and processes including proof of concept delivery with mitigating patch submissions.
  • Document and package these products (and associated components) in a form and format that shall facilitate its sharing and release to 3rd parties including, but not limited to, DoD components, government agencies and/or the general public when directed
  • Perform threat analysis to determine the AF and DoD level of risk associated with malicious logic and/or vulnerabilities and recommended courses of action to counter and mitigate risk.
  • Disassemble, decompile, and/or otherwise investigate and analyze suspected or known malicious objects.
  • Enhance methods to circumvent, defeat, or exploit the original designed purpose
  • Operate and maintain a standards based evaluation program to validate mission readiness and the effectiveness of unit cyber operations missions including documentation of individual cyber crew member qualifications and capabilities

Required Qualifications & Experience

  • Must possess an active TS/SCI security clearance.
  • 10 years of demonstrated cyber security software development experience
  • Shall be experienced in finding vulnerabilities either with or without source code at the kernel and/or user level
  • Ability to bypass authentication mechanisms
  • Skills and demonstrated experience in:
    • Coding languages (C, C++, Java, C#)

    • Scripting languages (Python, PowerShell, etc.)

    • Assembly (x86, x86_64, ARM)

    • Windows or Linux kernel level development

    • Agile development experience (Certifications preferable)

To Apply

No attachments will be accepted. Please email content of resume, references, work samples and preferred location (if applicable) to careers@root9b.com.