Today
Top Secret
Mid Level Career (5+ yrs experience)
No Traveling
IT - Software
Lorton, VA (On-Site/Office)
Title: Reverse Engineer
Client: FBI
Location: Newington, VA
Summary:
Analyze Android/iOS applications, operating systems, and binaries to extract forensic artifacts and support FBI investigative missions.
Responsibilities:
• Perform static/dynamic analysis using Ghidra, IDA Pro, Frida, LLDB.
• Develop hook libraries for message interception, multimedia, and crypto.
• Reverse engineer anti-tamper ecosystems and document bypass methods.
• Extract and normalize artifacts (SQLite, WAL files, logs, caches).
• Deliver outputs in JSON/XML/STIX for JADE integration.
• Engineered iOS cyber capabilities to enable operations across multiple customer missions ∙ Developed custom security tool in C and Objective-C for automating vulnerability discovery to support capability development ∙ Automated the build, test, and deployment environment to support safe and scalable capability validation
Skills/Experience:
• Strong background in binary analysis, mobile OS internals, anti-tamper research.
• Proficient in Python or Java for parser/tool development.
• Experience with emulator/sandbox environments and forensic workflows.
• Python, C, C++, C
• In-depth knowledge of Android, Linux, and Windows operating system internals
• Cryptography and secure computing
Client: FBI
Location: Newington, VA
Summary:
Analyze Android/iOS applications, operating systems, and binaries to extract forensic artifacts and support FBI investigative missions.
Responsibilities:
• Perform static/dynamic analysis using Ghidra, IDA Pro, Frida, LLDB.
• Develop hook libraries for message interception, multimedia, and crypto.
• Reverse engineer anti-tamper ecosystems and document bypass methods.
• Extract and normalize artifacts (SQLite, WAL files, logs, caches).
• Deliver outputs in JSON/XML/STIX for JADE integration.
• Engineered iOS cyber capabilities to enable operations across multiple customer missions ∙ Developed custom security tool in C and Objective-C for automating vulnerability discovery to support capability development ∙ Automated the build, test, and deployment environment to support safe and scalable capability validation
Skills/Experience:
• Strong background in binary analysis, mobile OS internals, anti-tamper research.
• Proficient in Python or Java for parser/tool development.
• Experience with emulator/sandbox environments and forensic workflows.
• Python, C, C++, C
• In-depth knowledge of Android, Linux, and Windows operating system internals
• Cryptography and secure computing
group id: 91007326