- Cipher Tech Solutions (Bethesda, MD)
- … software to customer specifications. Regardless of whether you are applying to a software developer or reverse engineer position, if your application is ... one! The candidate will be primarily focused on conducting software Reverse Engineering activities using a combination...practice of analyzing malicious code. The goal of a reverse engineer is to understand how the… more
- Cipher Tech Solutions (Vienna, VA)
- …with the ARM assembly language. Regardless of whether you are applying to a software developer or reverse engineer position, if your application is ... + Able to create and debug scripts that enable reverse engineering + Familiar with maintainable software ...practice of analyzing malicious code. The goal of a reverse engineer is to understand how the… more
- Cipher Tech Solutions (Vienna, VA)
- …reverse engineering is the practice of analyzing malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine ... : The candidate will be primarily focused on conducting software analysis of embedded products. The focus will be...analysis of embedded products. The focus will be on reverse engineering and potentially vulnerability analysis of provided systems… more
- Cipher Tech Solutions (Vienna, VA)
- …C++, Java, Kotlin, Swift and Objective-C Regardless of whether you are applying to a software developer or reverse engineer position, if your application is ... the form of mobile development, scripting, debugging, and value-added software development expertise. Maintain existing software and...practice of analyzing malicious code. The goal of a reverse engineer is to understand how the… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …and anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely enable ... * Familiarity with object-oriented, embedded, assembly, or machine code programming * Software or hardware reverse -engineering (eg, IDA Pro, Ghidra) * FPGA… more
- Cipher Tech Solutions (Vienna, VA)
- …reverse engineering is the practice of analyzing malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine ... independently as a Vulnerability Researcher to identify flaws in software . The candidate must be familiar with the latest...+ Strong C, ASM, and Python development experience + Reverse engineering utilizing any of IDA, Ghidra, or Binary… more
- Huntington Ingalls Industries (Springfield, VA)
- …and anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely enable ... effectiveness analyses for total systems. + Analyses are performed at all levels of total system product to include: concept, design, fabrication, test,… more
- Huntington Ingalls Industries (Springfield, VA)
- …and anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely enable ... effectiveness analyses for total systems. + Analyses are performed at all levels of total system product to include: concept, design, fabrication, test,… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …* Familiarity with object-oriented, embedded, assembly, or machine code programming * Software or hardware reverse -engineering (eg, IDA Pro, Ghidra) * FPGA ... VCS, Verdi), logical equivalence tools (eg, OneSpin 360EC), and proprietary software tools to verify design function and integrity. Common verification targets… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …and anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely enable ... effectiveness analyses for total systems. + Analyses are performed at all levels of total system product to include: concept, design, fabrication, test,… more