Return to Job Search
BA 303/304 Software Reverse Engineer Apr 22, 2020
Bethesda, MD  
BA 303/304 Computer Forensic & Intrusion Analyst (Senior)

Software Reverse Engineer
Smart phones, windows, Linux, Machine Systems
Understand Code, demonstrated experience

Required Skills:
• TS/SCI w/ CI Poly
• Advanced/Expert experience with reverse engineering and
network security tools, including IDA Pro, GDB, WinDdg,
YARA, Windows Sysinternals, Kali, Linux and/or Wireshark
• Expert level programming knowledge/experience with
either Windows Kernel, C, C++, Python and/or Assembly
Language and the ability to work in a team environment
using modern version control systems
• DoD 8570 compliance
• Advanced/Expert level experience in hardware
configuration and network/data communications and
• Advanced/Expert level experience in software development
and scripting
• Advanced/Expert level experience conducting intelligence
analysis and writing finished intelligence reporting
• Experience requiring a thorough understanding of
compiler specifics, operation system concepts, security
models and causes of most vulnerabilities and how to
exploit them. Preferably experience coding and
disassembling software on both Windows and Linux or other
BSD and Unix variants
• Advanced/Expert experience and knowledge of the types
and techniques of cyber exploitation and attack, including
virus, worm, trojan horse, logic bomb, and sniffer to
identify, quantify, prioritize, and report vulnerabilities
in various architectures, networks, communications,
applications, and systems
• Experience establishing defense mechanisms to detect and
deflect cyber attacks on networks and communications
systems and structures and designing and evaluating
applications that are secure from known and potential
methods of cyber attack
• Experience coordinating systems implementation
activities with key personnel to ensure the successful
transition from development to implementation and
operation present and defend a position and to communicate
with government and contractor team members
• Experience with virtualization, driver programming and
• Experience with ethical hacking and/or testing software

Desired Skills:
• Advanced/Expert experience with diagnosing and debugging
software systems
• Contractor may have experience with computer forensic
software packages such as EnCase, FTK, or Sleuth Kit /
This role is for a Software Reverse Engineer.
• Isolate, review, analyze, reverse-engineer, and modify
malicious and non-malicious programs and applications
• Write and produce technical reports related to the
scope, nature, and characteristics of the assessed
software and applications suitable for distribution to
both technical and non-technical audiences
• Work deep within the boot-process kernel and system
internals using tools like IDA Pro, debuggers, and in-
target probes to research the behavior of binaries
• Analyze software and firmware using reverse engineering
techniques to understand security vulnerabilities, working
closely with teammates who value innovation and execution
• Share knowledge by clearly articulation ideas through
papers and presentation to technical staff, management and
Government decision makers
• With COR approval, participate in working groups,
sponsor meetings, proposal writing and conferences
• Provide detailed understanding of how various software-
based attacks work at the memory and register level
•Perform in-depth analysis (dynamic/static) on malicious
software (ie: bots, worms, trojans) resident on Microsoft
Windows and Linux-based platforms to provide actionable
intelligence and, as appropriate, provide remediation
• Analyze, disassemble and reverse engineer software
binaries; document and transition results in reports,
presentations and technical exchanges
• Design, prototype, document, test and transition code
analysis methods and tools appropriate for operational use
• Proactively identify, define and advocate reverse
engineering and analysis processes, approaches, and
concepts to enhance/improve technical exploitation efforts
• Adequately explain, present, demonstrate (when
applicable) and document the operational impact of a
particular vulnerability
• Identify, define, determine origin and report on malware
and other select software found on media of interest
Alliant LCAT Description: Possesses and applies a
comprehensive knowledge across key tasks and high impact
assignments. Plans and leads major technology assignments.
Evaluates performance results and recommends major changes
affecting short-term project growth and success. Functions
as a technical expert across multiple project assignments.
May supervise others.
Suggested Qualifications: 18-22 years of professional
experience without a degree; or 10-14 years of
professional experience with a Bachelors degree from an
accredited college in a related discipline, or equivalent
experience/combined education; or 8-12 years of
professional experience with a related Masters degree; or
4 years of professional experience required with a related
PhD or JD; Considered an emerging authority / authority in
discipline. Consideration should always be given for the
level of specific domain expertise.

If you have previously submitted your resume input your login and password and click apply.
Click here if you are applying for the first time.