Reverse Engineer

Overview

On Site
Depends on Experience
Full Time
10% Travel

Skills

Threat Analysis
Reverse Engineering
Scripting
Software Development
Proprietary Software
Network
Operating Systems
Presentations
Linux
Linux Kernel
Incident Management
Instrumentation
Java
Embedded Systems
Encryption
Data Visualization
Debugging
Digital Forensics
C++
Collaboration
Tcpdump
Programming Languages
Python
RTOS
Leadership
MIPS Architecture
Malware Analysis
Dynamic Testing
FBI
Firmware
Forensics
JIRA
Law Enforcement
Communication
Confluence
Control Flow
Control Flow Graph
Documentation
ARM
Agile
Algorithms
Workflow
Protocol Analysis
Research
Analytical Skill
Android
Assembly
Bash
C
Git
Microsoft Windows
Rust
Version Control
WinDbg
Wireshark
x86

Job Details

Job Title: Reverse Engineer

Location with zip code: Newington, VA 22122

Duration: FTE

Job Description:

Reverse Engineer:

  • We are seeking Software Developers and Reverse Engineers to support the FBI s Reverse Engineering and Presentation team. You will work closely with government supervisors, product owners, and fellow developers to design, build, and deliver high-impact software solutions using Agile methodologies.
  • Your work will directly support mission-critical operations and national security initiatives.
  • This role demands deep technical experience, leadership skills, and operational awareness, especially in reverse engineering, secure software development, and data visualization for law enforcement.

Role & Responsibilities:

  • Perform static and dynamic analysis of binaries, executables, and firmware to determine functionality, origin, and potential threats.
  • Reverse engineer malicious software samples (Windows, Linux, Android, or embedded systems) to identify behavior, command-and-control mechanisms, and indicators of compromise (IOCs).
  • Decompile and analyze proprietary software and closed-source applications to understand algorithms, encryption schemes, and communication protocols.
  • Develop custom scripts, tools, and plugins (e.g., IDAPRO, Ghidra scripts) to automate or enhance analysis workflows.
  • Create detailed technical reports, including disassembly annotations, control-flow graphs, and mitigation recommendations.
  • Collaborate with red/blue teams, software developers, and threat hunters to improve detection capabilities and enhance defensive measures.
  • Support digital forensics and incident response teams with technical insight from reverse-engineered samples.
  • Participate in vulnerability research and exploit development for mission or defensive purposes.
  • Ensure analysis and artifacts comply with security policies, chain-of-custody standards, and classified handling procedures.
  • Candidates are not expected to have hands-on experience with every technology listed below. Instead, we seek individuals with strong analytical foundations, deep understanding of system internals, and demonstrated proficiency in one or more reverse engineering domains (e.g., malware analysis, binary instrumentation, or firmware analysis).

Required Skills:

  • Reverse Engineering Tools: IDA Pro, Ghidra, Radare2, Binary Ninja, OllyDbg, WinDbg, x64dbg, or similar.
  • Disassembly/Debugging Skills: x86/x64, ARM, MIPS assembly, decompilers, and symbol analysis.

Programming Languages:

  • Proficiency in C, C++, and Python; familiarity with Go, Rust, or Java a plus.
  • Scripting & Automation: IDA Python, Ghidra scripting, or custom static analysis automation using Python or Bash.
  • Malware & Threat Analysis: Familiarity with packers, obfuscation techniques, anti-debugging, and sandbox evasion methods.

Network & Protocol Analysis:

  • Wireshark, TCPDump, and analysis of network traffic generated by binaries.
  • Operating Systems: Deep understanding of Windows internals, Linux kernel, and possibly embedded/RTOS environments.

Security Knowledge:

  • Understanding of exploit mitigation (ASLR, DEP, CFG), memory forensics, and secure coding practices.

Version Control & Documentation:

  • Experience with Git, Jira, Confluence, or similar tools for maintaining traceability of findings.

About our Company: -

22nd Century Technologies, Inc., is one of the fastest growing IT Service Integrator and Workforce Solution companies in the United States. Founded in 1997, 22nd Century Technologies is a Certified National Minority Business Enterprise with 6,000+ people including 600+ Cyber SMEs nationwide supporting our customers in all 50 states, Canada, and Mexico. With HQs in Somerset, NJ and Mclean, VA, 22nd Century has 14 offices throughout the United States. As part of our unrelenting focus on quality and compliance, 22nd Century Technologies delivery is based on Certified Matured Processes including CMMI L3 Dev & SVC, ISO 20000, ISO 27001, and ISO 9001 quality processes. With a strong focus on the public sector, 22nd Century currently holds government contracts with 14 out of 15 Federal Executive agencies including DoD, 37 other Federal agencies, 50 States, 115+ Local agencies, and 37 School Districts. In the last three years, we have expanded our services to Fortune 500 and other commercial clients and currently support 80+ commercial clients.

Recognized among Best Company to Work For by Forbes, 22nd Century Technologies, Inc., consistently exceeds our clients expectations by focusing on their absolute satisfaction with jobs while keeping our employees motivated. 22nd Century Technologies is an Equal Opportunity Employer" and s & all other parties authorized to work in the US are encouraged to apply."

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.

About 22nd Century Technologies, Inc.