- Cipher Tech Solutions (Vienna, VA)
- …reverse engineering is the practice of analyzing malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine ... which directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and processing… more
- Carnegie Mellon University (Pittsburgh, PA)
- …systems and how attackers adapt their tradecraft to exploit those vulnerabilities. + Reverse engineer malicious code in support of high-impact customers, design ... and robustness of defenses and mitigations for AI systems, reverse engineering AI systems and models, and identifying new...Tensorflow, ART). + You have knowledge or familiarity with reverse engineering tools (eg NSA Ghidra, IDA Pro) +… more
- Carnegie Mellon University (Pittsburgh, PA)
- …systems and how attackers adapt their tradecraft to exploit those vulnerabilities. + Reverse engineer malicious code in support of high-impact customers, design ... and robustness of defenses and mitigations for AI systems, reverse engineering AI systems and models, and identifying new...Tensorflow, ART). + You have knowledge or familiarity with reverse engineering tools (eg NSA Ghidra, IDA Pro) +… more
- JPMorgan Chase (Wilmington, DE)
- …software on modern operating systems, edge devices, on premise, and open-source software. + Reverse engineer binaries using tools such as IDA Pro, Ghidra, or ... possess extensive technical curiosity, and have a strong background in reverse engineering. You will thrive in a collaborative environment, working on… more
- BOOZ, ALLEN & HAMILTON, INC. (Annapolis Junction, MD)
- …CNO implants and infrastructure using C / C++, Python, and Windows APIs. Reverse engineer closed-source binaries and system components at scale. Bypass modern ... implementation. Basic Qualifications: + 3+ years of experience in vulnerability research, reverse engineering, or exploit development + Experience using C or C++,… more
- Insight Global (Carol Stream, IL)
- …Responsibilities * Design and implement new features based on requirements. * Reverse engineer existing legacy applications with and eye towards moving ... Responsibilities * Design and implement new features based on requirements. * Reverse engineer existing legacy applications with and eye towards moving to cloud… more
- Amentum (Chantilly, VA)
- …Documents (ICDs), and operational procedures. + Collaborate with cross-functional teams to reverse engineer legacy codebases and produce UML models using ... mission. **Your Impact:** We are seeking a talented and experienced Senior Software Engineer to join our dynamic team. The ideal candidate will have over 10… more
- Battelle Energy Alliance dba Idaho National Laboratory (Idaho Falls, ID)
- …review applications during this time. *Responsibilities Include:* * Analyze ( reverse engineer ) anomalous/malicious software and hardware firmware/binaries. * ... penetration testing and vulnerability assessments. Perform advanced analysis and/or reverse engineering of suspect source code, including compiled executables. *… more
- MartinFederal Consulting, LLC (Huntsville, AL)
- …Perform static and dynamic analysis of known and unknown binary files + Reverse engineer compiled software to assess vulnerabilities and malicious functionality ... development projects and environments + Analyze cyber threat data including reverse engineering of malicious software, network traffic analysis, memory forensics,… more
- Amentum (Herndon, VA)
- …Control Documents (ICDs), and operational procedures + Guide cross-functional collaboration to reverse engineer legacy codebases and develop UML models with ... experience + Proven leadership in secure systems engineering, systems integration, and reverse engineering + Expertise in programming languages: C#, C++, SQL +… more