Today
Top Secret
Mid Level Career (5+ yrs experience)
No Traveling
IT - Software
Lorton, VA (On-Site/Office)
We are seeking Software Developers and Reverse Engineers to support the FBI’s– Reverse Engineering and Presentation team. You will work closely with government supervisors, product owners, and fellow developers to design, build, and deliver high-impact software solutions using Agile methodologies. Your work will directly support mission-critical operations and national security initiatives. This role demands deep technical experience, leadership skills, and operational awareness, especially in reverse engineering, secure software development, and data visualization for law enforcement.
Key Responsibilities:
Perform static and dynamic analysis of binaries, executables, and firmware to determine functionality, origin, and potential threats.
Reverse engineer malicious software samples (Windows, Linux, Android, or embedded systems) to identify behavior, command-and-control mechanisms, and indicators of compromise (IOCs).
Decompile and analyze proprietary software and closed-source applications to understand algorithms, encryption schemes, and communication protocols.
Develop custom scripts, tools, and plugins (e.g., IDAPRO, Ghidra scripts) to automate or enhance analysis workflows.
Create detailed technical reports, including disassembly annotations, control-flow graphs, and mitigation recommendations.
Collaborate with red/blue teams, software developers, and threat hunters to improve detection capabilities and enhance defensive measures.
Support digital forensics and incident response teams with technical insight from reverse-engineered samples.
Participate in vulnerability research and exploit development for mission or defensive purposes.
Ensure analysis and artifacts comply with security policies, chain-of-custody standards, and classified handling procedures.
Candidates are not expected to have hands-on experience with every technology listed below. Instead, we seek individuals with strong analytical foundations, deep understanding of system internals, and demonstrated proficiency in one or more reverse engineering domains (e.g., malware analysis, binary instrumentation, or firmware analysis).
Reverse Engineering Tools: IDA Pro, Ghidra, Radare2, Binary Ninja, OllyDbg, WinDbg, x64dbg, or similar.
Disassembly/Debugging Skills: x86/x64, ARM, MIPS assembly, decompilers, and symbol analysis.
Programming Languages: Proficiency in C, C++, and Python; familiarity with Go, Rust, or Java a plus.
Scripting & Automation: IDAPython, Ghidra scripting, or custom static analysis automation using Python or Bash.
Malware & Threat Analysis: Familiarity with packers, obfuscation techniques, anti-debugging, and sandbox evasion methods.
Network & Protocol Analysis: Wireshark, TCPDump, and analysis of network traffic generated by binaries.
Operating Systems: Deep understanding of Windows internals, Linux kernel, and possibly embedded/RTOS environments.
Security Knowledge: Understanding of exploit mitigation (ASLR, DEP, CFG), memory forensics, and secure coding practices.
Version Control & Documentation: Experience with Git, Jira, Confluence, or similar tools for maintaining traceability of findings.
Key Responsibilities:
Perform static and dynamic analysis of binaries, executables, and firmware to determine functionality, origin, and potential threats.
Reverse engineer malicious software samples (Windows, Linux, Android, or embedded systems) to identify behavior, command-and-control mechanisms, and indicators of compromise (IOCs).
Decompile and analyze proprietary software and closed-source applications to understand algorithms, encryption schemes, and communication protocols.
Develop custom scripts, tools, and plugins (e.g., IDAPRO, Ghidra scripts) to automate or enhance analysis workflows.
Create detailed technical reports, including disassembly annotations, control-flow graphs, and mitigation recommendations.
Collaborate with red/blue teams, software developers, and threat hunters to improve detection capabilities and enhance defensive measures.
Support digital forensics and incident response teams with technical insight from reverse-engineered samples.
Participate in vulnerability research and exploit development for mission or defensive purposes.
Ensure analysis and artifacts comply with security policies, chain-of-custody standards, and classified handling procedures.
Candidates are not expected to have hands-on experience with every technology listed below. Instead, we seek individuals with strong analytical foundations, deep understanding of system internals, and demonstrated proficiency in one or more reverse engineering domains (e.g., malware analysis, binary instrumentation, or firmware analysis).
Reverse Engineering Tools: IDA Pro, Ghidra, Radare2, Binary Ninja, OllyDbg, WinDbg, x64dbg, or similar.
Disassembly/Debugging Skills: x86/x64, ARM, MIPS assembly, decompilers, and symbol analysis.
Programming Languages: Proficiency in C, C++, and Python; familiarity with Go, Rust, or Java a plus.
Scripting & Automation: IDAPython, Ghidra scripting, or custom static analysis automation using Python or Bash.
Malware & Threat Analysis: Familiarity with packers, obfuscation techniques, anti-debugging, and sandbox evasion methods.
Network & Protocol Analysis: Wireshark, TCPDump, and analysis of network traffic generated by binaries.
Operating Systems: Deep understanding of Windows internals, Linux kernel, and possibly embedded/RTOS environments.
Security Knowledge: Understanding of exploit mitigation (ASLR, DEP, CFG), memory forensics, and secure coding practices.
Version Control & Documentation: Experience with Git, Jira, Confluence, or similar tools for maintaining traceability of findings.
group id: 10216532