Computer Forensic & Intrusion Analyst Reverse Software Engineer

Reverse Software Engineer, Analytics, Adobe AIR, Firmware, Reverse engineering, QA, Python, Interactive Disassembler
Full Time
Depends on Experience

Job Description

Computer Forensic & Intrusion Analyst Reverse Software Engineer

The Electronic On-Ramp, Inc. (EOR) is looking for the ideal candidate for the following position:

EOR invites you to participate in the most heroic journey of our lives together. Our mission, should you choose to accept it is patriotic in nature, humanitarian by design, filled with ecotourism opportunities, and peacekeeping activities. All fueled by high tech solutions and advanced by passion, education, and solid opportunities to live your purpose in our lifetime. Join EOR in support efforts within the United States Department of Defense, Department of Air Force, Air Force Office of Special Investigations, Defense Cyber Crime Center and Defense Computer Forensic Laboratory on one of the largest cyber security and forensics centric operations in the world, with plenty of upward mobility, growth opportunities and more.

               Please contact at Sandy;


Computer Forensic & Intrusion Analyst Reverse Software Engineer

The DoD-Defense Industrial Base Collaborative Information Sharing Environment (DCISE)—DCISE is the operational hub for DoD’s Defense Industrial Base (DIB) Cybersecurity Program, focused on protecting intellectual property and safeguarding DoD content residing on or transiting unclassified networks. DCISE develops and shares actionable threat products, performs cyber analysis and diagnostics, and provides remediation consults for DIB partners. The successful Cyber Intel Analyst candidate will support the Analytics Division (AD). AD conducts cyber analysis on information submitted by DIB Partners, the DoD and other USG-related reporting to provide a complete understanding of known or potential threats to unclassified DoD information on or transiting DIB systems and networks. This position supports the Tactical Operations Branch that daily functions are related to processing of voluntary and mandatory incident reports as well as Malware Analysis, Response Form, Response Supplements, and Partner Engagement. This analyst position is responsible for processing and analyzing indicator of compromise (IOC) based incident reports, coupled with data enrichment via OSINT, and creating the threat product for our Partners and organization Stakeholders.

These are the Computer Forensic and Intrusion Analyst Software Reverse Engineer Duties:

  • Isolate, review, analyze, reverse engineer, and modify malicious and non-malicious programs and applications
  • Write and produce technical reports related to the scope, nature, and characteristics of the assessed software and applications suitable for distribution to both technical and non-technical audiences
  • Work deep within the boot-process kernel and system internals using tools like IDA Pro, debuggers, and in-target probes to research the behavior of binaries
  • Analyze software and firmware using reverse engineering techniques to understand security vulnerabilities, working closely with teammates who value innovation and execution
  • Share knowledge by clearly articulation ideas through papers and presentation to technical staff, management and the organization decision makers
  • With COR approval, participate in working groups, sponsor meetings, proposal writing and conferences
  • Provide detailed understanding of how various software-based attacks work at the memory and register level
  • Perform in-depth analysis (dynamic/static) on malicious software (ie: bots, worms, trojans) resident on Microsoft Windows and Linux-based platforms to provide actionable intelligence and, as appropriate, provide remediation recommendations
  • Analyze, disassemble and reverse engineer software binaries; document and transition results in reports, presentations and technical exchanges
  • Design, prototype, document, test and transition code analysis methods and tools appropriate for operational use
  • Proactively identify, define and advocate reverse engineering and analysis processes, approaches, and concepts to enhance/improve technical exploitation efforts
  • Adequately explain, present, demonstrate (when applicable) and document the operational impact of a particular vulnerability
  • Identify, define, determine origin and report on malware and other select software found on media of interest

The candidate must possess and apply comprehensive knowledge across key tasks and high impact assignments. The candidate must plan and lead major technology assignments. The candidate must evaluate performance results and recommend major changes affecting short-term project growth and success. The candidate functions as a technical expert across multiple project assignments and may supervise others.

Required Skills:

  • TS/SCI w/ CI Poly
  • Advanced/Expert experience with reverse engineering and network security tools, including IDA Pro, GDB, WinDdg, YARA, Windows Sysinternals, Kali, Linux and/or Wireshark
  • Expert level programming knowledge/experience with either Windows Kernel, C, C++, Python and/or Assembly Language and the ability to work in a team environment using modern version control systems
  • 8570 compliance
  • Advanced or Expert level experience in hardware configuration and network/data communications and protocols
  • Advanced or Expert level experience in software development and scripting
  • Advanced or Expert level experience conducting intelligence analysis and writing finished intelligence reporting
  • Experience requiring a thorough understanding of compiler specifics, operation system concepts, security models and causes of most vulnerabilities and how to exploit them. Preferably experience coding and disassembling software on both Windows and Linux or other BSD and Unix variants
  • Advanced or Expert experience and knowledge of the types and techniques of cyber exploitation and attack, including virus, worm, trojan horse, logic bomb, and sniffer to identify, quantify, prioritize, and report vulnerabilities in various architectures, networks, communications, applications, and systems
  • Experience establishing defense mechanisms to detect and deflect cyber attacks on networks and communications systems and structures and designing and evaluating applications that are secure from known and potential methods of cyber attack
  • Experience coordinating systems implementation activities with key personnel to ensure the successful transition from development to implementation and operation present and defend a position and to communicate with organization and the operating team members
  • Experience with virtualization, driver programming and debugging
  • Experience with ethical hacking and/or testing software vulnerabilities

Desired Skills:

  • Advanced or Expert experience with diagnosing and debugging software systems
  • Candidate experience with computer forensic software packages such as EnCase, FTK, or Sleuth Kit / Autopsy
Dice Id : 10198765
Position Id : 3007
Originally Posted : 2 years ago
Have a Job? Post it

Similar Positions

Computer Forensic & Intrusion Analyst Journeyman (Mid)
  • The Electronic On-Ramp Inc.(EOR)
  • Linthicum Heights, MD, USA
Computer Forensic & Intrusion Analyst (Mid)
  • The Electronic On-Ramp Inc.(EOR)
  • Linthicum Heights, MD, USA
Computer Forensic & Intrusion Analyst Engineer with DOD Clearance
  • The Electronic On-Ramp Inc.(EOR)
  • Linthicum Heights, MD, USA
CLEARED PERSONS ONLY Computer Forensic & Intrusion Analyst I
  • The Electronic On-Ramp Inc.(EOR)
  • Linthicum Heights, MD, USA
Computer Forensic & Intrusion Analyst Engineer with DOD Clearance
  • The Electronic On-Ramp Inc.(EOR)
  • Linthicum Heights, MD, USA
Windows Application Reverse Engineer SME, Senior
  • Booz Allen Hamilton
  • Annapolis Junction, MD, USA
Reverse Engineer, Senior
  • Booz Allen Hamilton
  • Annapolis Junction, MD, USA
Senior Offensive Cyber Reverse Engineer
  • MAXAR Technologies
  • Fort Meade, MD, USA