Software Reverse Engineer

Booz Allen HamiltonUsa, VA
5h

About The Position

Software Reverse Engineer Key Role: Help to enable law enforcement’s pursuit of criminals and threat actors with a variety of digital investigative tools. Work as a security and vulnerability researcher in a team designing sophisticated engineering capabilities for use in lawful investigations of digital evidence. Conduct system vulnerability assessments across multiple platforms and primarily mobile, including Android, iOS, Linux, Windows, and related platforms. Leverage expertise in reverse engineering to discover implementation failures in firmware and cryptographic protocols and analyze updates to procedures. Identify possible sources of information leakage and code exploitation opportunities. Write code to simulate and exploit vulnerabilities and document findings in an internal knowledge base.

Requirements

  • Experience with reverse engineering software using disassemblers and debuggers, including IDA Pro, gdb, or adb
  • Knowledge of computer architecture, including x86, ARM, MIPS, Power PC, or x86_64
  • Ability to manage multiple assignments and adjust priorities based on mission requirements
  • Top Secret clearance
  • Bachelor's degree

Nice To Haves

  • 3+ years of experience with software development using C/C++ or Assembly
  • 1+ years of experience with developing or maintaining software or firmware for iOS, Android, or other embedded and non-x86 platforms
  • Experience with hardware debugging or interface methods, including JTAG, UART, or I2C
  • Experience with higher-level languages, including Java, Objective-C, or Python
  • Experience with firmware development, volatile memory manipulation, and software hooking
  • Bachelor's degree in Computer Science or Computer Engineering

Responsibilities

  • Conduct system vulnerability assessments across multiple platforms and primarily mobile, including Android, iOS, Linux, Windows, and related platforms.
  • Leverage expertise in reverse engineering to discover implementation failures in firmware and cryptographic protocols and analyze updates to procedures.
  • Identify possible sources of information leakage and code exploitation opportunities.
  • Write code to simulate and exploit vulnerabilities and document findings in an internal knowledge base.

Benefits

  • health
  • life
  • disability
  • financial
  • retirement benefits
  • paid leave
  • professional development
  • tuition assistance
  • work-life programs
  • dependent care
  • recognition awards program
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service