Jobs
>
Vienna

    Vulnerability Researcher - Vienna, United States - Cipher Tech Solutions

    Cipher Tech Solutions
    Cipher Tech Solutions Vienna, United States

    5 days ago

    Default job background
    Description

    Job Description

    Job Description

    FUTURE NEED

    Location: Vienna, VA

    Description:

    The candidate will be working independently as a Vulnerability Researcher to identify flaws in software. The candidate must be familiar with the latest techniques in vulnerability research and demonstrate their ability to follow best practices. Individual must be extremely detail oriented when documenting their research.

    If your application is approved, we will test you on both software development and reverse engineering skills as part of our hiring process. At this time, the majority of our open positions require an aptitude in both domains.

    Requirements:

    • MUST be a US citizen who is willing and eligible to be sponsored for a US government security clearance.
    • Must hold a Bachelor's degree in Computer Science, Electrical/Computer Engineering, Math or Physics (or be within one year of completion, no exceptions to degree type)
    • Strong C, ASM, and Python development experience
    • Reverse engineering utilizing any of IDA, Ghidra, or Binary Ninja
    • Experience with dynamic and static binary analysis & fuzzing techniques
    • Extensive experience with debuggers (GDB, ADB, etc.)
    • Experience auditing code for security vulnerabilities.
    • Demonstrated ability to self-drive research tasking
    • Motivated to learn complex systems

    Desired Skills:

    • Performing full system emulation for research and analysis
    • Understanding of network protocols
    • Experience reading and writing assembly (ARM, x86/x64)
    • Understanding of OS Internals (any major OS)

    Remote work is not an option. We do offer relocation assistance. Please see our careers page or inquire with your recruiter about terms and conditions.

    Vaccination Notice:

    Please be aware that you are applying for a position to work as a federal contractor. As such, Cipher Tech will require, and your employment will be subject to, such vaccinations as are required by federal, state, and local law requirements.

    ABOUT US

    At Cipher Tech Solutions, Inc. (Cipher Tech), we take great pride in supporting some of the most mission critical work in the Department of Defense and the Intelligence Community. The majority of our company is comprised of extremely talented engineers and developers who write production tools in direct support of one of two missions: digital forensics and malware reverse engineering.

    Digital forensics is the practice of extracting and processing evidence from computers, phones, tablets, cameras, flash-drives, and just about any other form of digital media. The results of our work are then used to support federal and military law enforcement, counterintelligence, and counter-terrorist activities.

    Malware reverse engineering is the practice of analyzing, oftentimes extremely advanced, malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as: how did it infect the victim's computer, what kind of information it is seeking to steal, how is it communicating with the author (actor), and who that actor might be working for.

    Commitment to Diversity & Inclusion

    Cipher Tech is an Equal Opportunity and Affirmative Action Employer. We value diversity and inclusion, not only for the sake of compliance, but also because diversity of thought drives progress and improves performance. All hiring and employment decisions are made on the basis of business requirements, performance, and merit-with no regard to race, color, religion, sexual orientation, gender, gender identity, national origin, or other protected status.

    Important:

    Be aware that you are applying for a job that requires a U.S. Government Security Clearance and requires the work be performed on site in an office, therefore, remote work is not possible.

    If you do not already hold a US government security clearance, we do have the ability to sponsor you for one, however be advised that this can be a multi-year process.

    The U.S. government will not issue security clearances to current or recent users of illegal drugs. On your application to us, you must acknowledge that you have not engaged in any illegal drug use within the past twelve months (illegal drug use includes, but is not limited to, the use of illegal substances, the misuse of prescriptions, the misuse of over-the-counter substances, and the use of medical or recreational marijuana that may be deemed legal at the state level but is still considered illegal by the federal government).

    NOTE: CIPHER TECH WILL NOT DISCRIMINATE AGAINST ANY QUALIFIED APPLICANTS WITH A DISABILITY, INCLUDING ILLEGAL DRUG USERS WHO HAVE RECENTLY SOUGHT PROFESSIONAL TREATMENT FOR A DRUG PROBLEM.

    Job Posted by ApplicantPro


  • Two Six Technologies Arlington, United States

    At Two Six Technologies, we build, deploy, and implement innovative products that solve the world's most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what's possible to empower our team and support our customers in buil ...


  • Cipher Tech Solutions Vienna, VA, United States

    FUTURE NEED Location: Vienna, VA Description: The candidate will be working independently as a Vulnerability Researcher to identify flaws in software · The candidate must be familiar with the latest techniques in vulnerability research and demonstrate their ability to follow best ...


  • Cipher Tech Solutions Vienna, United States

    FUTURE NEED · Location: Vienna, VA · Description: · The candidate will be working independently as a Vulnerability Researcher to identify flaws in software. The candidate must be familiar with the latest techniques in vulnerability research and demonstrate their ability to fol ...


  • Interclypse, Inc. Annapolis Junction, United States

    : · Interclypse is seeking motivated, career and customer-oriented a Mobile Vulnerability Researcher to join our team in Annapolis Junction, MD, to provide exemplary support to our customers and to begin an exciting and rewarding career within Interclypse. · The Interclypse diffe ...


  • BTS Software Solutions Annapolis Junction, United States

    **Vulnerability Researcher** · REQ ID:975-03 · **BTS Software Solutions** is seeking a **Vulnerability Researcher II** with an active **TS/SCI w/ POLY** to join our team in Ft. Meade, MD · **What You'll Get To Do**: · - Actively debug software and troubleshoot issues with softwar ...


  • Full Visbility Quantico, United States

    **About us**: · FULL VISIBILITY IS A CERTIFIED VIRGINIA BASED SMALL BUSINESS INFORMATION TECHNOLOGY SOLUTIONS PROVIDER SPECIALIZED IN DELIVERING SAFE AND SECURE SOLUTIONS FOR FEDERAL GOVERNMENT AGENCIES. · Full Visibility was established by technology industry veterans with exten ...


  • Chameleon Consulting Group Herndon, United States

    Company Overview · CCG is a technology company focused on equipping customers with the capabilities and support to conduct intelligent and successful cyber operations. We do this by finding the most talented engineers and operators in the country, give them some of the most chall ...


  • Chameleon Consulting Group Herndon, United States

    Company Overview · CCG is a technology company focused on equipping customers with the capabilities and support to conduct intelligent and successful cyber operations. We do this by finding the most talented engineers and operators in the country, give them some of the most chal ...


  • Two Six Technologies Arlington, United States

    Overview of Opportunity: · Two Six Technologies is actively seeking a Vulnerability Researcher to support our growing team in Arlington, Virginia. The team is composed of intellectual individuals, passionate about cybersecurity research. The team is growing and looking for someon ...


  • Kudu Dynamics, LLC Chantilly, VA, United States

    Vulnerability Researcher/Reverse Engineer Job Description Who We Are: Kudu Dynamics is a 100% employee-owned company, forged out of a decade of experience in computer network operations and staffed with talent who have built, overseen, and enhanced capabilities throughout the ent ...


  • Two Six Technologies Arlington, United States

    Overview of Opportunity · Two Six Technologies is seeking a Vulnerability Researcher to join our team in Arlington, Virginia. You will use and build upon cutting-edge techniques and tools to perform reverse engineering, vulnerability research, and exploit development on complex s ...


  • Two Six Technologies Arlington, United States

    Overview of Opportunity · Two Six Technologies is seeking a Vulnerability Researcher with active Secret Clearance to join our team in Arlington, Virginia.You will use and build upon cutting-edge techniques and tools to perform reverse engineering, vulnerability research, and expl ...


  • Parsons Annapolis Junction, United States

    In a world of possibilities, pursue one with endless opportunities. Imagine Next · When it comes to what you want in your career, if you can imagine it, you can do it at Parsons. Imagine a career working with intelligent, diverse people sharing a common quest. Imagine a workplace ...


  • Two Six Technologies Arlington, United States

    At Two Six Technologies, we build, deploy, and implement innovative products that solve the world's most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what's possible to empower our team and support our customers in buil ...


  • STR Arlington, United States

    STR is hiring a Vulnerability Researcher who has a passion for research and analysis of vulnerabilities in cyber physical systems. Work must be performed onsite. · What you will do: · Reverse engineering complex software or firmware targets, ranging from typical Windows/Linux b ...


  • Kududyn Chantilly, United States

    Vulnerability Researcher/Reverse Engineer Job Description · Who We Are: · Kudu Dynamics is a 100% employee-owned company, forged out of a decade of experience in computer network operations and staffed with talent who have built, overseen, and enhanced capabilities throughout t ...


  • Kududyn Chantilly, United States

    Vulnerability Researcher/Reverse Engineer Job Description · Who We Are: · Kudu Dynamics is a 100% employee-owned company, forged out of a decade of experience in computer network operations and staffed with talent who have built, overseen, and enhanced capabilities throughout th ...


  • AnaVation LLC Chantilly, United States Full time

    Be Challenged and Make a Difference · In a world of technology, people make the difference. We believe if we invest in great people, then great things will happen. At AnaVation, we provide unmatched value to our customers and employees through innovative solutions and an engagin ...


  • Palo Alto Networks Reston, United States

    Principal Vulnerability Researcher (Unit 42) · Palo Alto Networks · Implement Zero Trust, Secure your Network, Cloud workloads, Hybrid Workforce, Leverage Threat Intelligence & Security Consulting. Cybersecurity Services & Education for CISO's, Head of Infrastructure, Network S ...


  • Palo Alto Networks Reston, United States

    Principal Vulnerability Researcher (Unit 42) · Palo Alto Networks · Implement Zero Trust, Secure your Network, Cloud workloads, Hybrid Workforce, Leverage Threat Intelligence & Security Consulting. Cybersecurity Services & Education for CISOs, Head of Infrastructure, Network Se ...