This job posting is no longer active.
Job ID: 187672
Location: BETHESDA, MD, United States
Date Posted: Oct 21, 2019
Subcategory: SW Engineer
Shift: Day Job
Minimum Clearance Required: TS/SCI
Clearance Level Must Be Able to Obtain: None
Potential for Teleworking: No
SAIC is seeking a Senior Software Reverse-Engineer to support a major program at the National Media Exploitation Center (NMEC) within the National Capital Region. Duties and responsibilities include:
- Isolating, reviewing, analyzing, and reverse-engineering potentially malicious programs
- Writing and producing high-quality technical reports related to the scope, nature, and characteristics of the malicious software, suitable for distribution to both technical and nontechnical audiences
- Working deep within the boot process, kernel, and system internals to devise novel solutions using tools like IDA Pro, debuggers, and in-target probes to examine behavior of binaries
- Analyzing software and firmware using reverse-engineering techniques to understand security vulnerabilities, working closely with teammates who value innovation and execution
- Sharing knowledge by clearly articulating ideas through papers and presentations to technical staff, management, and customer decision-makers
- Participating in working groups, customer meetings, proposal writing, and conferences
- Providing detailed understanding of how various attacks work at the memory and register level
- Performing in-depth analysis (dynamic/static) on malicious software (i.e., bots, worms, Trojans) resident on Microsoft® Windows and UNlX® based platforms to provide actionable intelligence; as appropriate, provide remediation recommendations
- Analyzing, disassembling, and reverse-engineering malicious code; documenting and transitioning results in reports, presentations, and technical exchanges
- Designing, prototyping, documenting, testing and transitioning malicious code analysis methods and tools appropriate for operational use
- Pro-actively identifying, defining, and advocating reverse-engineering and analysis processes, approaches, and concepts to enhance/improve technical exploitation efforts
- Explaining presenting, demonstrating [when applicable], and documenting the operational impact of a particular vulnerability
- Identifying characteristics, such as origin, of malware or other select software on media of interest
- Must have a current/active TS/SCI and be willing and able to pass a CI polygraph prior to starting.
- Requires a Bachelor of Science degree in Computer Science, Software Engineering, Computer Engineering, or Electrical Engineering and at least ten (10) years of related experience.
- Experience with reverse-engineering and network security tools, including Ida Pro, Immunity Debug, WinDdg, YARA, Windows Sysinternals, Kali Linux, VIM, Emacs, Trace32/JTAG, GDB, make, ctags, git, mercurial, and/or Wireshark.
- Working-level Programming knowledge/experience with either Windows Kernel, C, C++, Python or Assembly Language and the ability to work in a team environment.
- Working-level expertise in hardware configuration and network/data communications.
- Working-level expertise in software development and scripting.
- Working-level expertise conducting intelligence analysis and writing finished intelligence reporting.
- Understanding of compiler specifics, operating system concepts, security models, and the causes of most vulnerabilities and how to exploit them, preferably, experience coding and disassembling software on both Windows and Linux or other *BSD and Unix variants.
- Experience and knowledge of the types and techniques of cyber exploitation and attack, including virus, worm, Trojan horse, logic bomb, and sniffer to identify, quantify, prioritize, and report vulnerabilities in enterprise architecture, networks, communications, applications, and systems.
- Experience establishing defense mechanisms to detect and deflect Cyber-attacks on networks, communications systems, and structures
- Experience designing and evaluating applications that are secure from known and potential methods of cyber-attack
- Experience coordinating systems implementation activities to ensure the successful transition from development to implementation and operation
- Experience in presenting and defending a position, and in communicating with government and contractor team members
- Experience with virtualization, driver programming, and debugging
- Experience with ethical hacking and/or testing vulnerabilities
- Experience with diagnosing and debugging software systems
- Industry-standard as EnCe, and ACE or CCE or GIAC certifications
- Preferred: Master of Science or PhD degree in Computer Science, Software Engineering, Computer Engineering, or Electrical Engineering and at least two (2) years of related experience.
SAIC is a premier technology integrator, solving our nation's most complex modernization and systems engineering challenges across the defense, space, federal civilian, and intelligence markets. Our robust portfolio of offerings includes high-end solutions in systems engineering and integration; enterprise IT, including cloud services; cyber; software; advanced analytics and simulation; and training. We are a team of 23,000 strong driven by mission, united purpose, and inspired by opportunity. Headquartered in Reston, Virginia, SAIC has annual revenues of approximately $6.5 billion. For more information, visit saic.com. For information on the benefits SAIC offers, see Working at SAIC. EOE AA M/F/Vet/Disability