Reverse/Software Engineer - Security Clearance Needed Engineering - Fredericksburg, VA at Geebo

Reverse/Software Engineer - Security Clearance Needed

Basic Qualifications Education Requirements:
Bachelor's degree in Engineering, a related specialized area or field is required plus a minimum of 5 years of relevant experience; or Master's degree plus a minimum of 3 years of relevant experience.
Clearance Requirements:
Department of Defense Top Secret security clearance is required at time of hire.
Applicants selected will be subject to a US Government security investigation and must meet eligibility requirements for access to classified information.
Due to the nature of work performed within our facilities, US citizenship is required.
Responsibilities for this Position PERKS:
This position is eligible for a sign-on bonus up to $10,000 for New Hires Only Imagine a world-class engineering environment.
Now add a team of exceptional talent along with technologies that are so advanced they're often classified.
That's what you'll find at General Dynamics Mission Systems.
Here you'll lead amazing engineers as they invent the technologies, products and services that help our service members, intelligence analysts and first responders keep our nation safe.
If you want the chance to lead, it's time to bring your talent to General Dynamics Mission Systems.
As a Reverse/Software Engineer, you'll conduct network or software vulnerability assessments and penetration testing utilizing reverse engineering techniques.
We'll rely on you to perform vulnerability analysis and exploitation of applications, operating systems or networks.
You'll also conduct vulnerability assessments and penetration testing utilizing reverse engineering techniques.
What you'll
Experience:
.
Technologies that aren't just top-notch, they're often top-secret.
A team of bold thinkers committed to exploring what's next.
Opportunities to gain new knowledge - as it's discovered What you bring to the table:
.
Bachelor's degree in Engineering, a related specialized area or field, or equivalent experience.
Expertise with firmware and embedded software.
Understanding of operating system fundamentals (interrupts, threading, virtual memory, device drivers) and internals (memory layouts and management, binary file formats).
Understanding and exposure to computer processor architectures and instructions sets What sets you apart:
.
Creative thinking with the ability to multi-task.
Consistently displays high performance attributes.
Team player who thrives in collaborative environments and revels in team success Representative Duties and Tasks:
.
Experience working on projects in the field of hardware, software, operating systems and IP protocol reverse engineering.
Extracts and analyzes firmware or embedded software.
Analyzes, decomposes, disassembles code, performs static code analysis, kernel-level debugging, and debugs and modifies software.
Work often involves software operating systems, malware or electronic signals.
Programs with scripting languages such as Python, Perl, or the bash shell.
.
Programs in C and assembly languages.
Involved in Protocol Analysis, Vulnerability Assessment, Security Research, Rapid Prototyping of proof of concept capabilities.
Protocol analysis of different systems such as USB (1.
1,2.
0,3.
0), Serial, wireless (ie 802.
11 B/G/N/AC, Zigbee, Bluetooth, RF and NFC) and cellular (3g, 4G/LTE, 5G).
.
Conducts vulnerability assessments and penetration testing utilizing reverse engineering techniques.
Performs analysis of complex software systems to determine both functionality and intent of software systems.
Experience working with mobile devices, and mobile operating system internals.
Contributes to the design, development and implementation of countermeasures, system integration, and tools specific to Cyber and Information Operations.
May prepare and presents technical reports and briefings.
May perform documentation, vetting and weaponization of identified vulnerabilities for operational use Knowledge, Skills, and Abilities:
.
Proficient knowledge of operating system fundamentals (interrupts, threading, virtual memory, device drivers) hardware, and internals (memory layouts and management, binary file formats).
Proficient with using and administering the Linux operating system.
Proficient knowledge and exposure to computer processor architectures and instructions sets.
Proficient ability to perform all responsibilities associated with the position.
Proficient ability to grasp and apply new information quickly.
Proficient ability to handle more complex assignments.
Shows proficient initiative on assignments, exercises independent judgment and professionally executes projects with little direction.
Proficient ability to use scripting languages such as Python, Perl, bash.
Proficient knowledge in low-level programming of device drivers in a Unix, Linux, or Windows environment #CJ3 #PL1 Company Overview General Dynamics Mission Systems (GDMS) engineers a diverse portfolio of high technology solutions, products and services that enable customers to successfully execute missions across all domains of operation.
With a global team of 12,000
top professionals, we partner with the best in industry to expand the bounds of innovation in the defense and scientific arenas.
Given the nature of our work and who we are, we value trust, honesty, alignment and transparency.
We offer highly competitive benefits and pride ourselves in being a great place to work with a shared sense of purpose.
You will also enjoy a flexible work environment where contributions are recognized and rewarded.
If who we are and what we do resonates with you, we invite you to join our high performance team! General Dynamics is an Equal Opportunity/Affirmative Action Employer that is committed to hiring a diverse and talented workforce.
EOE/Disability/Veteran PandoLogic.
Keywords:
Software Engineer, Location:
Fredericksburg, VA - 22408.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.