More jobs:
Software Reverse Engineer; TS/SCI- Senior & Mid
Job in
Bethesda, Montgomery County, Maryland, 20811, USA
Listed on 2026-01-27
Listing for:
Vexterra Group
Full Time
position Listed on 2026-01-27
Job specializations:
-
IT/Tech
Cybersecurity
Job Description & How to Apply Below
Software Reverse Engineer (TS/SCI)- Senior & Mid
Vexterra Group is searching for a Senior Software Reverse Engineer to support a Government Customer in Bethesda, Maryland:
DUTIES
- Isolate, review, analyze, and reverse-engineer potentially malicious programs
- Write and produce high-quality technical reports related to the scope, nature, and characteristics of the malicious software suitable for distribution to both technical and non-technical audiences
- Work deep within the boot process, kernel, and system internals to devise novel solutions using tools like IDA Pro, debuggers, and in-target probes to examine behavior of binaries
- Analyze software and firmware using reverse engineering techniques to understand security vulnerabilities, working closely with teammates who value innovation and execution
- Share knowledge by clearly articulating ideas through papers and presentations to technical staff, management, and customer decision-makers
- Take advantage of opportunities to participate in working groups, customer meetings, proposal writing, and conferences
- Provide detailed understanding of how various attacks work at the memory and register level
- Perform in-depth analysis (dynamic/static) on malicious software (i.e., bots, worms, Trojans) resident on Microsoft Windows and UNIX-based platforms to provide actionable intelligence; as appropriate, provide remediation recommendations
- Analyze, disassemble, and reverse-engineer malicious code; document and transition results in reports, presentations, and technical exchanges
- Using existing framework and within design, prototype, document, test, and transition malicious code analysis methods and tools appropriate for operational use
- Proactively identify, define, and advocate reverse engineering and analysis processes, approaches, and concepts to enhance/improve technical exploitation efforts
- Adequately explain, present, demonstrate (when applicable), and document the operational impact of a particular vulnerability
EDUCATION
- Bachelor of Science degree in Computer Science or Engineering with at least six (6) years of experience; OR
- Master of Science in Computer Science or Engineering with at least four (4) years of experience; OR
- Ph.D. degree in Computer Science or Engineering with at least two (2) years of experience
SECURITY CLEARANCE
- Active TS SCI + CI Polygraph
QUALIFICATIONS
- Two (2) years of experience with computer forensic software packages such as EnCase, FTK, or Sleuth Kit/Autopsy
- Advanced or Expert experience with reverse engineering and network security tools, including IDA Pro, Immunity Debug, Win Ddg, VIM, Emacs, Trace
32/JTAG, GDB, make, ctags, git, mercurial, and/or Wireshark - Expert-level programming knowledge/experience with either Windows Kernel, C, C++, Python, or Assembly Language and the ability to work in a team environment
- Advanced or Expert-level experience in hardware configuration and network/data communications
- Advanced or Expert-level experience in software development and scripting
- Advanced or Expert-level experience conducting intelligence analysis and writing finished intelligence reporting with high quality and with minimal revision
- Thorough understanding of compiler specifics, operating system concepts, security models, and the causes of most vulnerabilities and how to exploit them. Preferably, experience coding and disassembling software on both Windows and Linux or other BSD and Unix variants
- Advanced or Expert knowledge of the types and techniques of cyber exploitation and attack, including virus, worm, Trojan horse, logic bomb, and sniffer to identify, quantify, prioritize, and report vulnerabilities in enterprise architecture, networks, communications, applications, and systems
- Ability to establish defense mechanisms to detect and deflect cyber-attacks on networks and communications systems and structures and design and evaluate applications that are secure from known and potential methods of cyber-attack
- Ability to coordinate systems implementation activities with key personnel to ensure the successful transition from development to implementation and operation, present and defend a position, and to communicate with government and contractor team members
- Experience with virtualization, driver programming, and debugging
- Previous experience with ethical hacking and/or testing vulnerabilities
- Advanced or Expert experience with diagnosing and debugging software systems
We are an equal opportunity employer and welcome applications from diverse candidates.
#J-18808-LjbffrPosition Requirements
10+ Years
work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×