Reverse Engineer

Job Description:Reverse Engineer. Job ID 34398. Research Engineer Newington, VAAre you a problem solver? Do you like being part of a critical mission? Description:Seeking Software Reverse Engineers who like to research and develop leading edge technology for Mobile device. The work involves researching mobile operating system internals, software vulnerabilities, testing and debugging mobile devices running iOS, Android, etc. The projects are short, most tasks involve reverse engineering binaries, source code auditing, building tools to support vulnerability analysis, documenting the research, and writing proof of concept programs. The focus is on operations, not just on developing a white paper or concepts. Work will involve direct interaction with customers and other contractors to participate in the design and development process. The candidate will work closely with the customer in the deployment and support of new and ongoing operations. We are focused on providing our customers with unique capabilities and expertise that other companys lack. We operate as a high performance team focused on maintaining the top technical talent to perform the customer mission. The success of the customers mission is our number one priority. The ideal candidate is someone that is enamored by technology and eager to sink their teeth into something new. Qualifications. Qualifications: 12 years overall engineering experience. 5 years of experience in C, C++, or Objective-C programming. 5 years of experience in a scripting language (Python, Ruby, Linux Scripting, etc.) Desired Experience: BS Computer Engineering, Electrical Engineering, or Computer Science (a combination of years of experience, education, training and certifications will be considered in lieu of a degree) Working experience with multiple Operating Systems (Linux, Windows, OS X) Mobile and/or embedded development experience, preferably iOS. Able to work productively with limited supervision. Self-starter with an innate curiosity about mobile technology. Knowledgeable in Java. Knowledgeable with x86_64 and/or ARM assembly. Knowledgeable in computer security: Buffer and Heap overflows, ROP, ASLR, DEP, sandboxing, code signing, SE Linux, rooting devices, jailbreaking devices, etc. Knowledgeable in using IDA Pro, gdb, lldb, ollydb, make, gcc, otool, objdump. Applicants selected for employment will be subject to a Federal background investigation and must meet additional eligibility requirements for access to classified information or materials. US citizenship is required. Apply Now

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.