Lockheed Martin Software Reverse Engineer in Bethesda, Maryland
• Position contingent upon contract award • Position located in Bethesda, MD • Isolate, review, analyze, reverse-engineer, and modify malicious and non-malicious programs and applications • Write and produce technical reports related to the scope, nature, and characteristics of assessed software and applications suitable for distribution to both technical and non-technical audiences • Work deep within the boot process, kernel and system internals using tools like IDA Pro, debuggers and in-target probes to research the behavior of binaries • Analyze software and firmware using reverse engineering techniques to understand security vulnerabilities, working closely with teammates who value innovation and execution • Share knowledge by clearly articulating ideas through papers and presentations to technical staff, management and government decision makers • With COR approval, participate in working groups, sponsor meetings, proposal writing and conferences • Provide detailed understanding of how various software-based attacks work at the memory and register level • Perform in-depth analysis (dynamic/static) on malicious software (ie: bots, worms, trojans) resident on Microsoft Windows and Linux-based platforms to provide actionable intelligence and, as appropriate, provide remediation recommendations • Analyze, disassemble and reverse engineer software binaries; document and transition results in reports, presentations, and technical exchanges • Design, prototype, document, test and transition code analysis methods and tools appropriate for operational use • Proactively identify, define and advocate reverse engineering and analysis processes, approaches and concepts to enhance/improve technical exploitation efforts • Adequately explain, present, demonstrate (when applicable)and document the operational impact of a particular vulnerability • Identify, define, determine origin and report on malware and other select software found on media of interest
Basic Qualifications • Position requires TS/SCI with CI poly • Must have Bachelors of Science degree in Computer Science, Software Engineering, Computer Engineering or Electrical Engineering and at least four (4) years of related experience. Preferred: Master of Science or PhD degree in Computer Science, Software Engineering, Computer Engineering or Electrical Engineering and at least two (2) years of related experience • Working experience with reverse engineering and network security tools, including IDA Pro, GDB, WinDdg, YARA, Windows Sysinternals, Kali Linux, and/or Wireshark. • Working level programming knowledge/experience with either Windows Kernel, C, C++, Python and/or Assembly Language and the ability to work in a ream environment using modern version control systems • Working level experience in hardware configuration and network/data communications and protocols • Working level experience in software development and scripting • Working level experience conducting intelligence analysis and writing finished intelligence reporting • Thorough experience/understanding of compiler specifics, operating system concepts, security models, and the causes of most vulnerabilities and how to exploit them. Preferrably, experience coding and disassembling software on both Windows and Linux or other BSD and Unix variants • Working experience/knowledge of the types and techniques of cyber exploitation and attack, including virus, worm, trojan horse, logic bomb and sniffer to identify, quantify, prioritize and report vulnerabilities in various architectures, networks, communications, applications and systems • Experience establishing defense mechanisms to detect and deflect tcyber attacks on networks and communications systems and structures and designing and evaluating applications that are secure from known and potential methods of cyber attack • Experience coordination systems implementation activities with key personnel to ensure the successful transition from development to implementation and operation, presenting and defending a position and to communicating with government and contractor team members • Experience with virtualization driver programming and debugging • Experience with ethical hacking and/or testing software vulnerabilities • Experience with diagnosing and debugging software systems • DoD 8570 compliance •May have industry standard EnCE, ACE, CCE, or GIAC forensic certifications • Some these requirements may be waived by the government • Contractor personnel shall be required to complete and pass a written test prior to beginning work on the contract
As a leading technology innovation company, Lockheed Martin’s vast team works with partners around the world to bring proven performance to our customers’ toughest challenges. Lockheed Martin has employees based in many states throughout the U.S., and Internationally, with business locations in many nations and territories.
Join us at Lockheed Martin, where we’re engineering a better tomorrow.
Lockheed Martin is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.
Job Location(s): Bethesda Maryland