Vulnerability Researcher

2 weeks ago


Vienna, United States Cipher Tech Solutions Full time
Job DescriptionJob Description

FUTURE NEED

Location: Vienna, VA

Description:

The candidate will be working independently as a Vulnerability Researcher to identify flaws in software. The candidate must be familiar with the latest techniques in vulnerability research and demonstrate their ability to follow best practices. Individual must be extremely detail oriented when documenting their research.

If your application is approved, we will test you on both software development and reverse engineering skills as part of our hiring process. At this time, the majority of our open positions require an aptitude in both domains.

Requirements:

  • MUST be a US citizen who is willing and eligible to be sponsored for a US government security clearance.
  • Must hold a Bachelor's degree in Computer Science, Electrical/Computer Engineering, Math or Physics (or be within one year of completion, no exceptions to degree type)
  • Strong C, ASM, and Python development experience
  • Reverse engineering utilizing any of IDA, Ghidra, or Binary Ninja
  • Experience with dynamic and static binary analysis & fuzzing techniques
  • Extensive experience with debuggers (GDB, ADB, etc.)
  • Experience auditing code for security vulnerabilities.
  • Demonstrated ability to self-drive research tasking
  • Motivated to learn complex systems

Desired Skills:

  • Performing full system emulation for research and analysis
  • Understanding of network protocols
  • Experience reading and writing assembly (ARM, x86/x64)
  • Understanding of OS Internals (any major OS)

Remote work is not an option. We do offer relocation assistance. Please see our careers page or inquire with your recruiter about terms and conditions.

Vaccination Notice:

Please be aware that you are applying for a position to work as a federal contractor. As such, Cipher Tech will require, and your employment will be subject to, such vaccinations as are required by federal, state, and local law requirements.

ABOUT US

At Cipher Tech Solutions, Inc. (Cipher Tech), we take great pride in supporting some of the most mission critical work in the Department of Defense and the Intelligence Community. The majority of our company is comprised of extremely talented engineers and developers who write production tools in direct support of one of two missions: digital forensics and malware reverse engineering.

Digital forensics is the practice of extracting and processing evidence from computers, phones, tablets, cameras, flash-drives, and just about any other form of digital media. The results of our work are then used to support federal and military law enforcement, counterintelligence, and counter-terrorist activities.

Malware reverse engineering is the practice of analyzing, oftentimes extremely advanced, malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as: how did it infect the victim's computer, what kind of information it is seeking to steal, how is it communicating with the author (actor), and who that actor might be working for.

Commitment to Diversity & Inclusion

Cipher Tech is an Equal Opportunity and Affirmative Action Employer. We value diversity and inclusion, not only for the sake of compliance, but also because diversity of thought drives progress and improves performance. All hiring and employment decisions are made on the basis of business requirements, performance, and merit-with no regard to race, color, religion, sexual orientation, gender, gender identity, national origin, or other protected status.

Important:

Be aware that you are applying for a job that requires a U.S. Government Security Clearance and requires the work be performed on site in an office, therefore, remote work is not possible.

If you do not already hold a US government security clearance, we do have the ability to sponsor you for one, however be advised that this can be a multi-year process.

The U.S. government will not issue security clearances to current or recent users of illegal drugs. On your application to us, you must acknowledge that you have not engaged in any illegal drug use within the past twelve months (illegal drug use includes, but is not limited to, the use of illegal substances, the misuse of prescriptions, the misuse of over-the-counter substances, and the use of medical or recreational marijuana that may be deemed legal at the state level but is still considered illegal by the federal government).

NOTE: CIPHER TECH WILL NOT DISCRIMINATE AGAINST ANY QUALIFIED APPLICANTS WITH A DISABILITY, INCLUDING ILLEGAL DRUG USERS WHO HAVE RECENTLY SOUGHT PROFESSIONAL TREATMENT FOR A DRUG PROBLEM.



Job Posted by ApplicantPro

  • Vulnerability Researcher

    Found in: Dice One Red US C2 - 7 days ago


    Vienna, United States Cipher Tech Solutions Full time

    FUTURE NEED Location: Vienna, VA Description: The candidate will be working independently as a Vulnerability Researcher to identify flaws in software. The candidate must be familiar with the latest techniques in vulnerability research and demonstrate their ability to follow best practices. Individual must be extremely detail oriented when documenting their...

  • Intelligence Research Specialist

    Found in: beBee jobs US - 7 days ago


    Vienna, Virginia, United States Department Of The Treasury Full time

    Summary Become part of the team that safeguards the financial system from the abuses of financial crime. At the Financial Crimes Enforcement Network (FinCEN), we are at the forefront in preventing and detecting terrorist financing, money laundering, and other financial crime. Serve at the nation's financial intelligence unit and protect the United States...

  • Intelligence Research Specialist

    Found in: beBee S US - 2 weeks ago


    Vienna, United States Department Of The Treasury Full time

    Summary Become part of the team that safeguards the financial system from the abuses of financial crime. At the Financial Crimes Enforcement Network (FinCEN), we are at the forefront in preventing and detecting terrorist financing, money laundering, and other financial crime. Serve at the...


  • Vienna, United States CareerBuilder Full time

    Information System Security Engineer (ISSE) Adv (TS/SCI with Poly Required) GCI embodies excellence, integrity, and professionalism. The employees supporting our customers deliver unique, high-value mission solutions while effectively leveraging the technological expertise of our valued workforce to meet critical mission requirements in the areas of Data...


  • Vienna, United States Shuvel Full time

    Description: To research, evaluate, design, implement, and maintain system and product solutions, applying knowledge of engineering principles. To provide technical direction and engineering support for projects and infrastructure. Develop and maintain expert functional knowledge of evolving IT engineering industry technologies/competition, concepts and...

  • Full Stack Developer11763Hybrid

    Found in: beBee S US - 2 weeks ago


    Vienna, United States Shuvel Digital Full time

    Description: To develop, implement, and maintain internal web-based applications and their underlying architecture for current and future information systems support of Navy Federal corporate goals and objectives. To research and identify technologically innovative solutions to ensure effective and optimal communications and engagements internally and to...

  • Full Stack

    3 days ago


    Vienna, United States Shuvel Digital Full time

    Description: To develop, implement, and maintain internal web-based applications and their underlying architecture for current and future information systems support of Navy Federal corporate goals and objectives. To research and identify technologically innovative solutions to ensure effective and optimal communications and engagements internally and to...

  • Full Stack Developer11763Hybrid

    Found in: beBee jobs US - 2 weeks ago


    Vienna, Virginia, United States Shuvel Digital Full time

    Description:To develop, implement, and maintain internal web-based applications and their underlying architecture for current and future information systems support of Navy Federal corporate goals and objectives. To research and identify technologically innovative solutions to ensure effective and optimal communications and engagements internally and to...


  • Vienna, United States CareerBuilder Full time

    Logistics Management Institute With a legacy of solving the governments most complex challenges and an outcome-driven model to execute above expectation, LMI transforms missions with solutions that define the new speed of possible. View company page At LMI, were reimagining the path from insight to outcome at The New Speed of Possible. Combining a legacy of...


  • Vienna, United States Zen Strategics LLC Full time

    Job DescriptionJob DescriptionDescription:The Threat Hunt Senior Operator (THSO) works to identify advanced threats within the network to track and mitigate them prior to an attack of the IT systems of the organization. The THSO will create hypotheses to conduct searches for threats inside the network with the goal of gathering data on threat behaviors,...


  • Vienna, United States Navy Federal Credit Union Full time

    Overview To review, analyze, and report on Navy Federal's risk, quality, service, and controls, to improve operational efficiency and effectiveness, mitigate risk and remediate operational and regulatory vulnerabilities. Develop and lead risk assessment projects to assess compliance with federal and state regulatory requirements, industry standards, and...