Embedded Reverse Engineer
Listed on 2026-01-13
-
IT/Tech
Cybersecurity
embedded reverse engineer: all levels - future need
- closes 31-mar-2026 (est)
- embedded engineering
- per hour
- hourly
- full time
- subsidized healthcare, 401k matching, tuition reimbursement, vacation time, paid holidays, flexible work schedules, and more!
future need - not a current vacancy. If you apply, this could be a multi-year process.
descriptionthe candidate will be primarily focused on conducting software analysis of embedded products. The focus will be on reverse engineering and potentially vulnerability analysis of provided systems via static and/or dynamic tools and techniques. Enablement of potential further analysis, repeatable exploitation processes, feature addition, and technical reporting are also part of day-to-day activities. Embedded application design and testing may also be performed for the target platforms.
requirements- must be a us citizen (no exceptions!)
- must be willing and eligible to obtain a us government security clearance
- must hold a bachelor's degree or higher in computer science, electric engineering, computer engineering or closely related.
- must have experience with various programming and scripting languages (e.g., c, c++, assembly, python, and bash) to be used in embedded device interaction and prototyping
- must have experience with various microcontroller/microprocessor architectures and their instruction sets (e.g., arm, x86)
- must have experience with static and dynamic analysis and debugging tools and techniques for embedded targets (e.g., ida pro, ghidra, gdb, jtag, swd)
- must have excellent customer service and communication skills as well as the ability to prioritize and meet deadlines.
- must have strong leadership interpersonal and verbal/written communications skills that enable the ability to work effectively in a collaborative team environment
- familiarity with various traditional operating systems as well as real time operating systems (e.g., windows,
* nix, vxworks, qnx, freertos, embedded linux, windows iot/embedded) - familiarity with embedded hardware design and low-level communication with peripheral devices at the hardware level (e.g., uart, spi, i2c)
- experience researching hardware platform components and reading schematics and datasheets to understand device functionality
- experience in reverse engineering of embedded systems containing proprietary operating systems or bare metal applications
- mission focused work environment
- hsa contributions
- 401k matching
- holiday and paid time off (pto)
- monthly wan parties & quarterly events
- flexible hours
remote work is not an option. We do offer relocation assistance. Please see our careers page or inquire with your recruiter about the terms and conditions.
salary and other compensation: the hourly rate of pay ranges from $43.27 - $96.15
the salary range for this position is subject not only to the hire's skills, education, expertise, and years of experience, but also to features of the final position offered to the hire: including, but not limited to the location of the position, clearance required for the position, and the contract associated with the position. See our perks & benefits page for a general description of benefits and other potential compensation benefits:
about usat cipher tech solutions, inc. (cipher tech), we take great pride in supporting some of the most mission critical work in the department of defense and the intelligence community. The majority of our company is comprised of extremely talented software developers who write production tools which directly support one of two missions: digital forensics and malware reverse engineering.
digital forensics is the practice of extracting and processing evidence from computers, phones, tablets, cameras, flash-drives, and just about any other form of digital media. The results of our work are then used to support federal and military law enforcement, counterintelligence, and counter terrorist activities.
malware reverse engineering is the practice of analyzing malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as:
* how did it infect the victim's computer * what kind of information it is seeking to steal * how…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).