The Josef Group
Reverse Engineer
Ft. Belvoir
Top Secret, TS/SCI or TS/SCI Poly
Key Responsibilities:
Perform static and dynamic analysis of binaries, executables, and firmware to determine functionality, origin, and potential threats.
Reverse engineer malicious software samples (Windows, Linux, Android, or embedded systems) to identify behavior, command-and-control mechanisms, and indicators of compromise (IOCs).
Decompile and analyze proprietary software and closed-source applications to understand algorithms, encryption schemes, and communication protocols.
Develop custom scripts, tools, and plugins (e.g., IDAPRO, Ghidra scripts) to automate or enhance analysis workflows.
Create detailed technical reports, including disassembly annotations, control-flow graphs, and mitigation recommendations.
Collaborate with red/blue teams, software developers, and threat hunters to improve detection capabilities and enhance defensive measures.
Support digital forensics and incident response teams with technical insight from reverse-engineered samples.
Participate in vulnerability research and exploit development for mission or defensive purposes.
Ensure analysis and artifacts comply with security policies, chain-of-custody standards, and classified handling procedures.
Candidates are not expected to have hands-on experience with every technology listed below. Instead, we seek individuals with strong analytical foundations, deep understanding of system internals, and demonstrated proficiency in one or more reverse engineering domains (e.g., malware analysis, binary instrumentation, or firmware analysis).
#J-18808-Ljbffr
Perform static and dynamic analysis of binaries, executables, and firmware to determine functionality, origin, and potential threats.
Reverse engineer malicious software samples (Windows, Linux, Android, or embedded systems) to identify behavior, command-and-control mechanisms, and indicators of compromise (IOCs).
Decompile and analyze proprietary software and closed-source applications to understand algorithms, encryption schemes, and communication protocols.
Develop custom scripts, tools, and plugins (e.g., IDAPRO, Ghidra scripts) to automate or enhance analysis workflows.
Create detailed technical reports, including disassembly annotations, control-flow graphs, and mitigation recommendations.
Collaborate with red/blue teams, software developers, and threat hunters to improve detection capabilities and enhance defensive measures.
Support digital forensics and incident response teams with technical insight from reverse-engineered samples.
Participate in vulnerability research and exploit development for mission or defensive purposes.
Ensure analysis and artifacts comply with security policies, chain-of-custody standards, and classified handling procedures.
Candidates are not expected to have hands-on experience with every technology listed below. Instead, we seek individuals with strong analytical foundations, deep understanding of system internals, and demonstrated proficiency in one or more reverse engineering domains (e.g., malware analysis, binary instrumentation, or firmware analysis).
#J-18808-Ljbffr