Unrivaled Dedication to The Craft

Reverse Engineer and Vulnerability Research Subject Matter Expert

Position

Reverse Engineer and Vulnerability Research Subject Matter Expert

Location: 
310 S. Saint Mary's Street
San Antonio, TX 78205

Functional Responsibilities

  • Analyze dynamic/static software and hardware systems; using disassembling toolkits.
  • Perform behavioral and code analysis.
  • Examine protected or packaged executables
  • Patch compiled executables
  • Analyze malware designed to use encryption, hashing, obfuscation, stealthy functionality, specific targeting and initiate time-triggered attacks.
  • Analyze, enhance, and demonstrate patches, countermeasures and defensive solutions for malicious logic, exploits and attack vectors as determined by government.
  • Track analysis of potential vulnerabilities and proofs-of-concept developed. Familiar with vulnerability disclosure procedures and processes including proof of concept delivery with mitigating patch submissions.
  • Document and package these products (and associated components) in a form and format that shall facilitate its sharing and release to 3rd parties including, but not limited to, DoD components, government agencies and/or the general public when directed
  • Perform threat analysis to determine the AF and DoD level of risk associated with malicious logic and/or vulnerabilities and recommended courses of action to counter and mitigate risk.
  • Disassemble, decompile, and/or otherwise investigate and analyze suspected or known malicious objects.
  • Enhance methods to circumvent, defeat, or exploit the original designed purpose
  • Operate and maintain a standards based evaluation program to validate mission readiness and the effectiveness of unit cyber operations missions including documentation of individual cyber crew member qualifications and capabilities

Required Qualifications & Experience

  • Must possess an active TS/SCI security clearance.
  • 10 years of demonstrated cyber security software development experience
  • Shall be experienced in finding vulnerabilities either with or without source code at the kernel and/or user level
  • Ability to bypass authentication mechanisms
  • Skills and demonstrated experience in:
    • Coding languages (C, C++, Java, C#)

    • Scripting languages (Python, PowerShell, etc.)

    • Assembly (x86, x86_64, ARM)

    • Windows or Linux kernel level development

    • Agile development experience (Certifications preferable)

To Apply

No attachments will be accepted. Please email content of resume, references, work samples and preferred location (if applicable) to careers@root9b.com.