Reverse/Software Engineer (New Hire BONUS Up To $10K) Engineering - Fredericksburg, VA at Geebo

Reverse/Software Engineer (New Hire BONUS Up To $10K)

Basic Qualifications :
Education Requirements:
Bachelor's degree in Engineering, a related specialized area or field is required plus a minimum of 5 years of relevant experience; or Master's degree plus a minimum of 3 years of relevant experience.
Clearance Requirements:
Department of Defense Top Secret security clearance is required at time of hire.
Applicants selected will be subject to a US Government security investigation and must meet eligibility requirements for access to classified information.
Due to the nature of work performed within our facilities, US citizenship is required.
Responsibilities for this Position:
PERKS:
This position is eligible for a sign-on bonus up to $10,000 for New Hires OnlyImagine a world-class engineering environment.
Now add a team of exceptional talent along with technologies that are so advanced they're often classified.
That's what you'll find at General Dynamics Mission Systems.
Here you'll lead amazing engineers as they invent the technologies, products and services that help our service members, intelligence analysts and first responders keep our nation safe.
If you want the chance to lead, it's time to bring your talent to General Dynamics Mission Systems.
As a Reverse/Software Engineer, you'll conduct network or software vulnerability assessments and penetration testing utilizing reverse engineering techniques.
We'll rely on you to perform vulnerability analysis and exploitation of applications, operating systems or networks.
You'll also conduct vulnerability assessments and penetration testing utilizing reverse engineering techniques.
What you'll
Experience:
Technologies that aren't just top-notch, they're often top-secretA team of bold thinkers committed to exploring what's nextOpportunities to gain new knowledge - as it's discoveredWhat you bring to the table:
Bachelor's degree in Engineering, a related specialized area or field, or equivalent experienceExpertise with firmware and embedded softwareUnderstanding of operating system fundamentals (interrupts, threading, virtual memory, device drivers) and internals (memory layouts and management, binary file formats)Understanding and exposure to computer processor architectures and instructions setsWhat sets you apart:
Creative thinking with the ability to multi-taskConsistently displays high performance attributesTeam player who thrives in collaborative environments and revels in team successRepresentative Duties and Tasks:
Experience working on projects in the field of hardware, software, operating systems and IP protocol reverse engineeringExtracts and analyzes firmware or embedded softwareAnalyzes, decomposes, disassembles code, performs static code analysis, kernel-level debugging, and debugs and modifies softwareWork often involves software operating systems, malware or electronic signalsPrograms with scripting languages such as Python, Perl, or the bash shell.
Programs in C and assembly languagesInvolved in Protocol Analysis, Vulnerability Assessment, Security Research, Rapid Prototyping of proof of concept capabilitiesProtocol analysis of different systems such as USB (1.
1,2.
0,3.
0), Serial, wireless (ie 802.
11 B/G/N/AC, Zigbee, Bluetooth, RF and NFC) and cellular (3g, 4G/LTE, 5G).
Conducts vulnerability assessments and penetration testing utilizing reverse engineering techniquesPerforms analysis of complex software systems to determine both functionality and intent of software systemsExperience working with mobile devices, and mobile operating system internalsContributes to the design, development and implementation of countermeasures, system integration, and tools specific to Cyber and Information OperationsMay prepare and presents technical reports and briefingsMay perform documentation, vetting and weaponization of identified vulnerabilities for operational useKnowledge, Skills, and Abilities:
Proficient knowledge of operating system fundamentals (interrupts, threading, virtual memory, device drivers) hardware, and internals (memory layouts and management, binary file formats)Proficient with using and administering the Linux operating systemProficient knowledge and exposure to computer processor architectures and instructions setsProficient ability to perform all responsibilities associated with the positionProficient ability to grasp and apply new information quicklyProficient ability to handle more complex assignmentsShows proficient initiative on assignments, exercises independent judgment and professionally executes projects with little directionProficient ability to use scripting languages such as Python, Perl, bashProficient knowledge in low-level programming of device drivers in a Unix, Linux, or Windows environment#CJ3Company Overview:
General Dynamics Mission Systems (GDMS) engineers a diverse portfolio of high technology solutions, products and services that enable customers to successfully execute missions across all domains of operation.
With a global team of 12,000
top professionals, we partner with the best in industry to expand the bounds of innovation in the defense and scientific arenas.
Given the nature of our work and who we are, we value trust, honesty, alignment and transparency.
We offer highly competitive benefits and pride ourselves in being a great place to work with a shared sense of purpose.
You will also enjoy a flexible work environment where contributions are recognized and rewarded.
If who we are and what we do resonates with you, we invite you to join our high performance team!General Dynamics is an Equal Opportunity/Affirmative Action Employer that is committed to hiring a diverse and talented workforce.
EOE/Disability/Veteran.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.