Reverse Engineer with Security Clearance Engineering - Arlington, VA at Geebo

Reverse Engineer with Security Clearance

NewGen is seeking a Reverse Engineer, your primary responsibilities will be performing vulnerability research and exploit/cyber-attack development to support platform vulnerability assessments, customer-directed research, internal research, and to improve core productsYou will assess critical operational technology systems, reverse engineer their software and hardware, identify vulnerabilities, design exploits and attacks, build custom capabilities, and field your effects on live networks and platformsYou will play a crucial role in helping defend critical national infrastructure, weapons platforms, and logistics by thinking like an attackerYou will be a member of the Research team and should be prepared to understand, reverse engineer, and find vulnerabilities in OT devices down to the hardware and firmware levelYou should be quick and effective at deconstructing and understanding a firmware binary using a tool like Ghidra, IdaPro, etcYou should also have a strong understanding of C/C+
and other common embedded device programming languages, as well as embedded Real Time Operating Systems so that you understand the firmware/software functions of the device being researchedYou should also be able to examine the hardware components of a device, identify chipsets, interpret datasheets, and extract firmwareExperience in reverse engineering either hardware or software is required.
Recommended Skills C+
(Programming Language) Firmware Hardware Infrastructure Ida Pro Infrastructure Management Real Time Operating Systems Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.