Today
Top Secret/SCI
Unspecified
Unspecified
IT - Security
Sterling, VA (On-Site/Office)
Zachary Piper Solutions is seeking a Principal Cyber Engineer to join a Federal Government Program located in Sterling, VA through 100% full onsite presence . The Principal Cyber Engineer will focus on Android/mobile platform security, reverse engineering, & cyber tool development, leading technical efforts in analyzing vulnerabilities, building custom tooling, & integrating low-level insights into mission-driven mobile applications with a dynamic, multi-program classified environment.
Responsibilities of the Principal Cyber Engineer include:
Qualifications of the Principal Cyber Engineer include:
Compensation for the Principal Cyber Engineer includes:
Keywords: principal cyber engineer, cyber engineer, sterling, Virginia, VA, Android, mobile, mobile platform, platform security, reverse engineering, cyber, cyber tool, cyber tool development, technical efforts, vulnerabilities, custom tooling, low-level insights, mobile applications, dynamic, multi-program, classified environment, CNO, CNE, malware, malware analysis, exploit development, OPSEC, design, develop, ARM assembly, low-level code, obfuscated, obfuscated binaries, Ghidra, IDA Pro, Frida, reverse engineer, mobile application development, multi-program classified environment, compartmentalized, customer mission, C, C++, Unix, Linux, Make, CMake, security, Radare2, ARM64, ARM32, architecture, exploit development, AOSP, open-source, leader, leadership, Computer Network Operations, Computer Network Exploitation, Operational Security, offensive, defensive, cyber operations, intelligence, exploit vulnerabilities, sensitive information, critical data, exploit, exploited, Android Open Source Project, Android operating system, 64-bit, 32-bit, embedded, embed, program, programming language, mobile device, development tool, embedded system,
#LI-SW1 #LI-ONSITE
Responsibilities of the Principal Cyber Engineer include:
- Lead reverse engineering efforts on Android/mobile platforms, including malware analysis & exploit development
- Design & develop custom cyber tools (CNO/CNE) for offensive & defensive operations, ensuring scalability & OPSEC compliance
- Analyze low-level code (ARM assembly) & obfuscated binaries using tools like Ghidra, IDA Pro, & Frida
- Integrate reverse engineering insights into mobile application development to support mission needs
- Collaborate within a multi-program classified environment, adapting to shifting priorities & compartmentalized customer missions
- Provide technical leadership & mentorship to mid-level engineers, setting direction & guiding complex problem-solving
Qualifications of the Principal Cyber Engineer include:
- 8+ years of experience with C/C++ development on Unix/Linux platforms using Make/CMake
- Hands-on experience with Android or other mobile platforms, especially in security & reverse engineering
- Expertise in reverse engineering tools such as Ghidra, IDAPro, HexRays, Frida, or Radare2
- Strong understanding of ARM64/ARM32 architecture, including disassembly & exploit development
- Experience with CNE/CNO tool development for classified environments
- Familiarity with large open-source projects, such as AOSP
- Leadership experience, including mentoring & setting technical direction
- Comfort working in compartmentalized, multi-program environments with shifting priorities
- Active TS/SCI clearance
Compensation for the Principal Cyber Engineer includes:
- Salary Range: $115,000-$150,000 **depending on experience**
- Benefits: Medical, Dental, Vision, 401k Plan, Holidays, PTO, Education Incentives, sick leave as required by law
Keywords: principal cyber engineer, cyber engineer, sterling, Virginia, VA, Android, mobile, mobile platform, platform security, reverse engineering, cyber, cyber tool, cyber tool development, technical efforts, vulnerabilities, custom tooling, low-level insights, mobile applications, dynamic, multi-program, classified environment, CNO, CNE, malware, malware analysis, exploit development, OPSEC, design, develop, ARM assembly, low-level code, obfuscated, obfuscated binaries, Ghidra, IDA Pro, Frida, reverse engineer, mobile application development, multi-program classified environment, compartmentalized, customer mission, C, C++, Unix, Linux, Make, CMake, security, Radare2, ARM64, ARM32, architecture, exploit development, AOSP, open-source, leader, leadership, Computer Network Operations, Computer Network Exploitation, Operational Security, offensive, defensive, cyber operations, intelligence, exploit vulnerabilities, sensitive information, critical data, exploit, exploited, Android Open Source Project, Android operating system, 64-bit, 32-bit, embedded, embed, program, programming language, mobile device, development tool, embedded system,
#LI-SW1 #LI-ONSITE
group id: 10430981