1587 IT & Software Developer jobs in the US
Software reverse engineer - analysis & debugging
$112,000 - 179,000
Peraton
Old Madison Pike Northwest, Huntsville
$112,000 - 179,000
Requirements
Must:
- Bachelors degree in Computer Science, Software Engineering, Information Security, or a related field (or similar experience) combined with 8+ years of pertinent work experience;
- Alternatively, a Masters degree in Computer Science, Software Engineering, Information Security, or a related field (or similar experience) accompanied by 6+ years of pertinent work experience;
- Or a PhD in Computer Science, Software Engineering, Information Security, or a related field (or similar experience) with 3+ years of relevant work experience.
- At least 3+ years of relevant experience in software reverse engineering, with a preference for backgrounds in material exploitation, malware analysis, or vulnerability research.
- Demonstrable experience with virtualization platforms (e.g. VMware Workstation, KVM/QEMU) for dynamic analysis, sandboxing, and system emulation.
- Practical experience in forensic disk image analysis utilizing tools like Autopsy and guestfish to mount, modify, and extract artifacts from raw disk images.
- Proficient in the SWRE toolchain, instrumental tools such as Ghidra, GDB, Wireshark, MobaXterm, NMAP, and the Linux binutils suite (like readelf, strace, ltrace, ldd).
- Proven capability to perform live debugging of complex applications using GDB, including setting breakpoints, inspecting memory, and analyzing program state for reverse engineering purposes.
- Extensive knowledge of Linux/Unix systems, including administration, network setup, SSH key management (ssh-keygen, virt-customize), and advanced command-line interfaces.
- Strong understanding of low-level programming languages (C, C++, Assembly) and familiarity with scripting languages such as Python.
- Comprehensive knowledge of operating system internals, x86/x64 assembly language, and CPU architecture.
- Familiarity with network analysis tools (Wireshark, nmap) for establishing system behavior baselines and identifying communication protocols.
- Experience dealing with non-standard system setups, including foreign language character sets and legacy hardware emulation.
- An in-depth understanding of common security practices and an ability to detect security vulnerabilities within software architectures.
- TS/SCI clearance with capability to obtain a polygraph examination.
Responsibilities
- Execute thorough analysis of compiled software and binaries, employing forensic techniques to extract vital artifacts and understand system architecture.
- Use virtualization and sandboxing environments (like VMware, KVM/QEMU) to run and monitor software within its natural operating environment, conducting system call tracing, network monitoring, and filesystem analysis for real-time insights.
- Carry out live, on-system debugging with tools such as the GNU Debugger (GDB), analyzing code execution in real-time while linking findings to static analysis conducted via Ghidra.
- Leverage advanced reverse engineering capabilities, particularly focusing on Ghidra to decompile, disassemble, and analyze software, unveiling hidden or malicious logic that may not be evident through dynamic assessments.
- Collaborate with analysts to marry system and operational document findings, utilizing this context to clarify the systems Concept of Operations (CONOPS) and prioritize exploitation tasks accordingly.
- Investigate vulnerabilities, undocumented features, and new capabilities within target systems, crafting proof-of-concept exploits and evaluating their potential ramifications on operational dependencies.
- Utilize a specialized toolkit for in-depth analysis, including disk imagers, virtual machine managers, network scanners, and debuggers for comprehensive exploitation processes.
- Provide mentorship to junior engineers in specific software reverse engineering methodologies, tools, and techniques.
Description
At Peraton, we stand at the forefront of national security, innovating solutions that span the globe and reach the furthest corners of the galaxy. As a premier integrator of mission capabilities and transformative IT solutions, we empower government agencies and the U.S. armed forces with trusted and advanced technologies. Our dynamic team is dedicated to tackling the most pressing challenges faced by our clients, ensuring global safety and security. We offer a competitive salary range of $112,000 - $179,000, along with a comprehensive benefits package that includes medical, dental, vision, life insurance, health savings accounts, short and long-term disability, parental leave, a 401(k), paid time off, and company holidays. This role is based on-site in Huntsville, AL.
Something wrong or incorrect with this job? Tell us in the chat 💬 on the right ➡️
You can find C / C++ Developer salaries in the United States here.
How many C / C++ Developer jobs are in the United States?
Currently, there are 1587 C / C++ openings.
Is the US a good place for C / C++ Developers?
The US is one of the best countries to work as a C / C++ Engineer. It has a vibrant startup community, growing tech hubs and, most important: lots of interesting jobs for people who work in tech.
Which companies are hiring for C / C++ Developer jobs in the United States?
Sched LLC, Jump, Snaplii, Meitou Inc., Freedom Pet Supplies, Infoya Inc., GE Aerospace among others, are currently hiring for C / C++ roles in the United States.
The company with most openings is Boeing as they are hiring for 66 different C / C++ Developer jobs in the United States. They are probably quite committed to find good C / C++ Developers.
The company with most openings is Boeing as they are hiring for 66 different C / C++ Developer jobs in the United States. They are probably quite committed to find good C / C++ Developers.