Mid-Level Reverse Engineer
Northern, VA
Applications have closed
AnaVation
AnaVation is seeking a mid-level reverse engineer for our mission-critical customer. A successful candidate will use Reverse Engineering skills to tear down mobile applications to further customer’s mission. Research results are initially turned into tools using python and may require mobile development skills to finalize tools. Successful candidate must have software development experience.
Position is currently remote, with one visit per month to the Newington, VA location desired, but not required. Remote status is expected to continue on an ongoing basis subject to customer guidance.
Position is currently remote, with one visit per month to the Newington, VA location desired, but not required. Remote status is expected to continue on an ongoing basis subject to customer guidance.
Required Qualifications
- Experience using industry standard RE tools (IDA Pro, Ghidra, JEB, Hopper) to determine how closed-source software functions
- Experience developing, debugging and/or reverse engineering code for popular mobile programming languages (i.e., Java, Objective-C, Swift, etc.)
- Experience with the exploitation of mobile devices and/or the software within mobile devices to enable surveillance or access to protected information
- Experience determining how files are structured and identifying standard methods for encoding data
- Comfortable viewing, analyzing, and understanding raw binary data
- Ability to write programs in a variety of languages, such as C, C++, C#, Python and Java
- Understanding of how operating systems function, such as the separation between kernel and user space
- Knowledge of common mobile architectures and their associated instructions, including x86, ARM, and ARM64
- Experience working on multiple OS platforms, including Linux, Mac, Windows, Android, and iOS
- Experience with iOS and Android mobile development languages, including Java, Objective-C, or Swift
- Possession of exceptional interpersonal skills, including ability to: work alongside others, teach co-workers and clients/customers, and learn new technical trades and become a resident expert within a team
- Previous experience working in an agile development environment with short duration tasking
- BA or BS degree or six years of related experience
Desired Qualifications
- Experience in identifying and exploiting vulnerabilities, such as memory corruption through stack overflows, heap overflows, integer overflows, and logical flaws
- Experience with mitigation to deter exploitation, such as ASLR, code signing, non-executable memory protections, and sandboxing
- Experience with methods to bypass exploit mitigation and detection techniques
- Experience with writing and running data fuzzers
- Expertise in analyzing results to identify vulnerabilities
- Understanding of how symmetrical and asymmetrical encryption functions and is implemented in various code flows
- Experience with relational database management systems (i.e., SQL and SQLite)
- Ability to analyze and decode data packets over a networked connection, and experience with network analysis tools (e.g., Wireshark)
- Knowledge of how IP/Serial based protocols work and how to reverse their format including checksums, MACs, encoding formats, HTTP, XML, etc.
Tags: Agile Android C Encryption Exploit Ghidra iOS Java Linux Python Reverse engineering SQL Surveillance Vulnerabilities Windows XML
Region:
North America
Job stats:
9
1
0
Category:
Security Engineering Jobs
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Security Operations Engineer jobs
- Open Information Security Specialist jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Manager Pentest H/F jobs
- Open Senior Information Security Analyst jobs
- Open Senior Cyber Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Principal Security Engineer jobs
- Open Product Security Engineer jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Analyst jobs
- Open Senior Information Security Engineer jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Chief Information Security Officer jobs
- Open Cybersecurity Consultant jobs
- Open Consultant SOC / CERT H/F jobs
- Open Security Specialist jobs
- Open Cybersecurity Specialist jobs
- Open Senior Penetration Tester jobs
- Open Sr. Security Engineer jobs
- Open Security Researcher jobs
- Open Senior Security Architect jobs
- Open Security Operations Analyst jobs
- Open ISO 27001-related jobs
- Open Clearance-related jobs
- Open Windows-related jobs
- Open Application security-related jobs
- Open Network security-related jobs
- Open Agile-related jobs
- Open Pentesting-related jobs
- Open Vulnerability management-related jobs
- Open GCP-related jobs
- Open Analytics-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open DevOps-related jobs
- Open Security assessment-related jobs
- Open Malware-related jobs
- Open Kubernetes-related jobs
- Open CI/CD-related jobs
- Open Security Clearance-related jobs
- Open IDS-related jobs
- Open CEH-related jobs
- Open EDR-related jobs