Vulnerability Researcher/Reverse Engineer Engineering - San Antonio, TX at Geebo

Vulnerability Researcher/Reverse Engineer

An exciting opportunity to work full-time researching and reverse engineering vulnerabilities and malware in effort for engineers to develop innovative/unique cyber capabilities to assist a law enforcement/counterintelligence organization conduct on-net investigations/operations.
The selected candidate will join a small, talented, highly effective performing team providing vulnerability research and reverse engineering supporting the unique challenges faced in global cyber investigations and operations.
Client is looking for a mid-level VR/RE with previous experience.
Analyze and/or reverse engineer the behavior of potentially malicious code using both static and dynamic tools and techniques - author technical reports of findings Conduct detection and analysis of malware and malware communication techniques Identify potential operational opportunities while conducting reverse engineering actions Solve challenging problems in the realm of vulnerability analysis and exploitation Conduct research for the purposes of finding new vulnerabilities and enhance existing capabilities Use various websites and YARA signatures and provide reports on active cyber threats and their location on the web - find threats, provide invaluable information on adversary's TTPs and recommendations on how to proceed Collect and maintain a catalog of malware for retroactive analysis Participate in the development of R&D prototypes Active TS/SCI 5-7 years of reverse engineering experience within the last five years, and at least six years of malware analysis, technical analysis, military intelligence, DNI, or SIGINT experience Demonstrated competency with disassemblers/decompilers such as IDA Pro, Ghidra, Radare, or Binary Ninja Strong aptitude with software debuggers using tools such as WinDbg, OllyDbg, ImmunityDbg, x64 Debugger, GDB, KGDB, NTSD, IDA Debugger, or other similar tools In-depth knowledge of x86/64, ARM and MIPS instruction sets and architectures and MZ/PE, ELF, APK, and IPS file formats Ability to write custom tools to aid in deeper analysis of a sample, such as lifting/executing target code using software-based CPU emulators, decoding custom network protocols, and emulating false C2 Proficiency in one or more programming or scripting languages such as C, C++, Java, Assembly, Python, Perl, Ruby, Bash, Node.
js, Spark, Puppet, SALT, KAFKA, HADOOP, etc Bachelor's or master's degree in Computer Science, Software Engineering, Cybersecurity, or related discipline from an accredited institution in addition to the required experience Certifications such as SANS GREM, GCFA; IACRB CREA; eLearnSecurity eCRE; Offensive Security OSCE, OSEE, or other similar technical certifications Proficiency in three or more of the above programming or scripting languages Recommended Skills Apache Hadoop Apache Kafka Apache Spark Assembly And Installation Bash (Scripting Language) C (Programming Language) Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.