FUTURE NEED
Locations: Odenton, MD
Description:
The candidate will be primarily focused on conducting hardware/software analysis of embedded products. The focus will be on reverse engineering and potentially vulnerability analysis of provided systems via static and/or dynamic tools and techniques. Enablement of potential further analysis, repeatable exploitation processes, feature addition, and technical reporting are also part of day-to-day activities. Embedded application design and testing may also be performed for the target platforms.
Requirements:
Must be a US citizen (No exceptions!)
Must hold a US Government Security Clearance at the TS level or higher
Must hold a Bachelor's Degree or higher in Computer Science, Electric Engineering, Computer Engineering or closely related.
Must have experience with various programming and scripting languages (e.g., C, C++, Assembly, Python, and Bash) to be used in embedded device interaction and prototyping
Must have experience with various microcontroller/microprocessor architectures and their instruction sets (e.g., ARM, x86)
Must have experience with static and dynamic analysis and debugging tools and techniques for embedded targets (e.g., IDA Pro, Ghidra, GDB, JTAG, SWD)
Must have excellent customer service and communication skills as well as the ability to prioritize and meet deadlines.
Must have strong leadership interpersonal and verbal/written communications skills that enable the ability to work effectively in a collaborative team environment
Desirable:
Familiarity with various traditional operating systems as well as Real Time Operating Systems (e.g., Windows, *nix, VxWorks, QNX, FreeRTOS, Embedded Linux, Windows IoT/Embedded)
Familiarity with embedded hardware design and low-level communication with peripheral devices at the hardware level (e.g., UART, SPI, I2C)
Experience researching hardware platform components and reading schematics and datasheets to understand device functionality
Experience in reverse engineering of embedded systems containing proprietary operating systems or bare metal applications
Benefits:
Mission focused work environment
Subsidized medical/dental/vision insurance
HSA contributions
401k matching
Holiday and Paid Time Off (PTO)
Monthly WAN parties and quarterly events
Flexible hours
Remote work is not an option.We do offer relocation assistance. Please see our careers page or inquire with your recruiter about terms and conditions.
Education Requirements:
Entry-Level:
Candidates must possess a relevant bachelor's degree, with some programming experience outside of the classroom. No formal experience is required, although it is preferred.
Mid-Level:
Candidates must possess a relevant bachelor's degree and have a minimum of 5 years' experience OR possess a relevant master's degree and have a minimum of 3 years' experience.
Senior-Level:
Candidates must possess a relevant bachelor's degree and have a minimum 10 years' experience OR possess a relevant master's degree and have a minimum of 8 years' experience.
Vaccination Notice:
Please be aware that you are applying to a position to work as a federal contractor. As such, Cipher Tech will require, and your employment will be subject to, such vaccinations as are required by federal, state, and local law requirements.
ABOUT US
At Cipher Tech Solutions, Inc. (Cipher Tech), we take great pride in supporting some of the most mission critical work in the Department of Defense and the Intelligence Community. The majority of our company is comprised of extremely talented engineers and developers who write production tools in direct support of one of two missions: digital forensics and malware reverse engineering.
Digital forensics is the practice of extracting and processing evidence from computers, phones, tablets, cameras, flash-drives, and just about any other form of digital media. The results of our work are then used to support federal and military law enforcement, counterintelligence, and counter-terrorist activities.
Malware reverse engineering is the practice of analyzing, oftentimes extremely advanced, malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as: how did it infect the victim's computer, what kind of information it is seeking to steal, how is it communicating with the author (actor), and who that actor might be working for.
Commitment to Diversity and Inclusion
Cipher Tech is an Equal Opportunity and Affirmative Action Employer. We value diversity and inclusion, not only for the sake of compliance, but also because diversity of thought drives progress and improves performance. All hiring and employment decisions are made on the basis of business requirements, performance, and merit-with no regard to race, color, religion, sexual orientation, gender, genderidentity, national origin, or other protected status.
Important:
Be aware that you are applying for a job that requires a U.S. Government Security Clearance.
If you do not already hold a US government security clearance, we do have the ability to sponsor you for one, however be advised that this can be a multi-year process.
The U.S. governmentwill not issuesecurity clearances to current or recent users of illegal drugs. On your application to us, you must acknowledge that you have not engaged in any illegal drug use within the past twelve months (illegal drug use includes, but is not limited to, the use of illegal substances, the misuse of prescriptions, the misuse of over-the-counter substances, and the use of medical or recreational marijuana that may be deemed legal at the state level but is still considered illegal by the federal government).
NOTE: CIPHER TECH WILL NOTDISCRIMINATEAGAINST ANY QUALIFIED APPLICANTS WITH A DISABILITY, INCLUDING ILLEGAL DRUG USERS WHO HAVE RECENTLY SOUGHT PROFESSIONAL TREATMENT FOR A DRUG PROBLEM.
For more information, or to apply now, you must go to the website below. Please DO NOT email your resume to us as we only accept applications through our website.
https://ciphertechsolutions.applicantpro.com/jobs/3450915-197876.html