Reverse Engineer / Software Engineer (TS /SCI with Polygraph) (Baltimore, MD)

| Baltimore, MD
Apply Now
By clicking continue you agree to Built In’s Privacy Policy and Terms of Use.
Minimum Clearance Required to Start: Top Secret SCI w/Polygraph

Job Description: Are you ready to be part of a cutting edge cybersecurity project that will make a huge impact on the security of DOD/Intel community? On this program, you'll get the chance to leverage your existing software engineering and cybersecurity knowledge to lead and perform in depth reverse engineering, identify threats and develop mitigations of weapons and space systems under the US Combatant Commands (COCOM's).

We seek developers that are versatile, display leadership qualities and are enthusiastic to tackle new challenges across the full stack as we continue to push security forward.

Responsibilities: This exciting role includes performing Software Engineering and vulnerability research with a focus on OCO (Offensive Cyber Operations) and DCO (Defensive Cyber Operations) activities. Work with customers directly performing full cycle system engineering, gathering requirements and source code, to technical documentation and specifications. Performing long term, in depth vulnerability assessments using reverse engineering, kernel debugging, and exploitation technologies. Engineers are encouraged to be creative and exhaust every technical avenue to uncover weaknesses of the system and exploit them. The feasibility and impact of the findings will often require team members to develop prototype exploitation based on identified vulnerabilities. Qualifications:
  • 7 + years in software development and maintenance w/H.S. diploma
  • Bachelor's degree in Computer Science/Engineering and 5 years experience; Master's degree in Computer Science/Engineering or related field, and 3 years experience.
  • Experience in x86/x64 assembly, software reverse engineering, kernel debugging, and protocol stacks
  • Experience developing computer exploits
  • Experience in Software Reverse Engineering with at least 1 of the following tool or an equivalent: IDAPro, GDB, WinDbg, Immunity/OllyDbg
  • Experience in malware analysis and mitigation techniques
  • Strong understanding of the Windows and Linux Operating System internals and APIs
  • Knowledge of analyzing shellcode, packed and obfuscated and the associated algorithms a plus
  • Experience with scripting languages such as Python, Bash, Pearl, etc
  • Experience in host and network analysis to identify and characterize anomalies and vulnerabilities in the platform
  • Experience documenting findings in reports and briefings
  • Security certifications a plus: CISSP, C|EH, CREA, GPEN, GREM, OSCP, OSCE
Must be able to obtain, maintain and/or currently possess a security clearance.

The position may require a COVID vaccination or an approved accommodation/exemption for a disability/medical condition or religious belief as required by federal, state, provincial or local mandates or customer requirements.
More Information on Parsons Corporation
Parsons Corporation operates in the Cybersecurity industry. The company is located in Centreville, VA, Washington, DC and Columbia, MD. Parsons Corporation was founded in 1944. It has 14420 total employees. It offers perks and benefits such as Flexible Spending Account (FSA), Dental Benefits, Vision Benefits, Health Insurance Benefits, Life Insurance and 401(K). To see all 112 open jobs at Parsons Corporation, click here.
Read Full Job Description
Apply Now
By clicking continue you agree to Built In’s Privacy Policy and Terms of Use.

Similar Jobs

Apply Now
By clicking continue you agree to Built In’s Privacy Policy and Terms of Use.
Save jobView Parsons Corporation's full profileFind similar jobs