Today
Top Secret
Unspecified
Unspecified
IT - Security
Vienna, VA (On-Site/Office)
Location: Vienna, VA
Description:
The candidate will be working independently as a Vulnerability Researcher to identify flaws in software. The candidate must be familiar with the latest techniques in vulnerability research and demonstrate their ability to follow best practices. Individual must be extremely detail oriented when documenting their research.
Requirements:
Desired Skills:
Remote work is not an option. We do offer relocation assistance. Please see our careers page or inquire with your recruiter about the terms and conditions.
Salary and other Compensation:
The hourly wage range is: $43.27 - $108.17
The salary range for this position is subject not only to the hire's skills, education, expertise, and years of experience, but also to features of the final position offered to the hire: including, but not limited to the location of the position, clearance required for the position, and the contract associated with the position. See our Perks & Benefits page for a general description of benefits and other potential compensation benefits: https://www.ciphertechsolutions.com/careers/perks-benefits/
About Us:
At Cipher Tech Solutions, Inc. (Cipher Tech), we take great pride in supporting some of the most mission critical work in the Department of Defense and the Intelligence Community. The majority of our company is comprised of extremely talented software developers who write production tools which directly support one of two missions: digital forensics and malware reverse engineering.
Digital forensics is the practice of extracting and processing evidence from computers, phones, tablets, cameras, flash-drives, and just about any other form of digital media. The results of our work are then used to support federal and military law enforcement, counterintelligence, and counter terrorist activities.
Malware reverse engineering is the practice of analyzing malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as:
* How did it infect the victim's computer *What kind of information it is seeking to steal *How is it communicating with the author (actor) *Who that actor might be.
Vaccination Notice:
Please be aware that you are applying for a position to work as a federal contractor. As such, Cipher Tech will require, and your employment will be subject to, such vaccinations as are required by federal, state, and local law requirements.
Important Security Clearance Information:
Be aware that you are applying for a job that requires you already hold a U.S. government security clearance at time of application.
The U.S. government will not issue security clearances to recent users of illegal drugs. On your application to us, you must acknowledge that you have not engaged in any illegal drug use within the past twelve months (illegal drug use includes, but is not limited to, the use of illegal substances, the misuse of prescriptions, the misuse of over-the-counter substances, and the use of medical or recreational marijuana that may be deemed legal at the state level but is still considered illegal by the federal government). NOTE: CIPHER TECH WILL NOT DISCRIMINATE AGAINST ANY QUALIFIED APPLICANTS WITH A DISABILITY, INCLUDING ILLEGAL DRUG USERS WHO HAVE RECENTLY SOUGHT PROFESSIONAL TREATMENT FOR A DRUG PROBLEM.
--
Cipher Tech is an Equal Opportunity Employer. All hiring and employment decisions are made on the basis of business requirements, performance, and merit with no regard to race, color, religion, sexual orientation, gender, gender identity, national origin, or other protected status.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity or national origin.
Description:
The candidate will be working independently as a Vulnerability Researcher to identify flaws in software. The candidate must be familiar with the latest techniques in vulnerability research and demonstrate their ability to follow best practices. Individual must be extremely detail oriented when documenting their research.
Requirements:
- MUST be a US citizen
- Must hold a US government security clearance at the TS Level or higher at time of application
- Must hold a Bachelor's degree in Computer Science, Electrical/Computer Engineering, Math or Physics (or be within one year of completion, no exceptions to degree type)
- Strong C, ASM, and Python development experience
- Reverse engineering utilizing any of IDA, Ghidra, or Binary Ninja
- Experience with dynamic and static binary analysis & fuzzing techniques
- Extensive experience with debuggers (GDB, ADB, etc.)
- Experience auditing code for security vulnerabilities.
- Demonstrated ability to self-drive research tasking
- Motivated to learn complex systems
Desired Skills:
- Performing full system emulation for research and analysis
- Understanding of network protocols
- Experience reading and writing assembly (ARM, x86/x64)
- Understanding of OS Internals (any major OS)z
Remote work is not an option. We do offer relocation assistance. Please see our careers page or inquire with your recruiter about the terms and conditions.
Salary and other Compensation:
The hourly wage range is: $43.27 - $108.17
The salary range for this position is subject not only to the hire's skills, education, expertise, and years of experience, but also to features of the final position offered to the hire: including, but not limited to the location of the position, clearance required for the position, and the contract associated with the position. See our Perks & Benefits page for a general description of benefits and other potential compensation benefits: https://www.ciphertechsolutions.com/careers/perks-benefits/
About Us:
At Cipher Tech Solutions, Inc. (Cipher Tech), we take great pride in supporting some of the most mission critical work in the Department of Defense and the Intelligence Community. The majority of our company is comprised of extremely talented software developers who write production tools which directly support one of two missions: digital forensics and malware reverse engineering.
Digital forensics is the practice of extracting and processing evidence from computers, phones, tablets, cameras, flash-drives, and just about any other form of digital media. The results of our work are then used to support federal and military law enforcement, counterintelligence, and counter terrorist activities.
Malware reverse engineering is the practice of analyzing malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as:
* How did it infect the victim's computer *What kind of information it is seeking to steal *How is it communicating with the author (actor) *Who that actor might be.
Vaccination Notice:
Please be aware that you are applying for a position to work as a federal contractor. As such, Cipher Tech will require, and your employment will be subject to, such vaccinations as are required by federal, state, and local law requirements.
Important Security Clearance Information:
Be aware that you are applying for a job that requires you already hold a U.S. government security clearance at time of application.
The U.S. government will not issue security clearances to recent users of illegal drugs. On your application to us, you must acknowledge that you have not engaged in any illegal drug use within the past twelve months (illegal drug use includes, but is not limited to, the use of illegal substances, the misuse of prescriptions, the misuse of over-the-counter substances, and the use of medical or recreational marijuana that may be deemed legal at the state level but is still considered illegal by the federal government). NOTE: CIPHER TECH WILL NOT DISCRIMINATE AGAINST ANY QUALIFIED APPLICANTS WITH A DISABILITY, INCLUDING ILLEGAL DRUG USERS WHO HAVE RECENTLY SOUGHT PROFESSIONAL TREATMENT FOR A DRUG PROBLEM.
--
Cipher Tech is an Equal Opportunity Employer. All hiring and employment decisions are made on the basis of business requirements, performance, and merit with no regard to race, color, religion, sexual orientation, gender, gender identity, national origin, or other protected status.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity or national origin.
group id: 91125127