Reverse Software Engineer Information Technology (IT) at Geebo

Reverse Software Engineer

Apertus Partners is a Woman Owned Small Business, headquartered in Leesburg, VA.
Apertus Partners provides IT managed services, and contracting support in both the federal and commercial space.
Our leadership team has former military experience and a combined 50 years of industry knowledge.

Clear.
Concise.
Results.

Key Role:
Vulnerability Researcher/Reverse Engineer

Analyze, evaluate, and exploit secure technologies.
Discover and create new ways to recover data that would otherwise be inaccessible.
Reverse engineer software to identify weaknesses in cryptographic mechanisms, discover external data leakage, and document possible code execution vulnerabilities.
Write proof of concept code and generate technical documentation on all vulnerabilities discovered.

Basic
Qualifications:

-4
years of experience in reverse engineering using tools, including IDA Pro, Windbg, Ollydbg, and GDB

-4
years of experience in software development with C/C++

-4
years of experience with low level operating system internals

-Active Top Secret clearance

-BA or BS degree

Additional
Qualifications:

-Experience with network traffic analysis using Wireshark

-Experience with scripting languages, including Python and Bash

-Knowledge of basic cryptography and cryptographic primitives, including hash functions, symmetric ciphers, and public key encryption

Clearance:

Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; Top Secret clearance is required.

.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.