Software Reverse Engineer
CAtegory:
Clearance:
Location:
Telecommute:
About Peraton
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees solve the most daunting challenges that our customers face. Visit peraton.com to learn how we’re keeping people around the world safe and secure.
Program Overview
About The Role
- Requirements: Software Reverse Engineering (with support to development and malware analysis efforts)
- Background: (U) Conduct software exploitation against applications, middleware, operating systems (OS) user interface, OS drivers/runtimes, firmware and other binary data:
- Exploitation of program and application to support priority technical exploitation requirements.
- Research behavior of binaries and share detailed understanding of how apps behave at memory/register level in support of technical exploitation operations.
- Support efforts to design, prototype, document, test, conduct exploitation automation and transition code analysis methods and tools specific to technical exploitation operations.
Qualifications
Required:
- Experience with Windows operating system & architecture.
- Experience with static analysis tools such as IDA Pro, Ghidra and Binary Ninja.
- Experience with debugging tools such as WinDbg.
- Experience with virtualization, sandboxing, and emulation tools like VMware, KVM, QEMU and others.
- Working knowledge of programming languages such as C, C++, .NET, Python, Java, etc.
- Active TS/SCI with Poly required
Minimum of 8 years with BS/BA; Minimum of 6 years with MS/MA; Minimum of 3 years with PhD. A degree should be within one of these fields: Information Technology, Cybersecurity, Computer Science, Information Systems, Data Science, or Software Engineering.
Preferred:
- Active DoD 8570, IAT Level II Certification.
SCA / Union / Intern Rate or Range
Details
EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.