CACI is seeking a cleared Software Vulnerabilities Engineer to be a part of a software engineering team for SIES Program. This position is located at Aberdeen Proving Ground, MD
What You’ll Get to Do:
Performs research and analysis of security vulnerabilities associated with a wide variety of architectures to include x86, MIPS, ARM, amongst others, with emphasis on embedded software applications and Real Time OS (RTOS).
Demonstrate experience with reverse engineering tools, such as IDA Pro, the use of fuzzing techniques and tools, and understanding dynamic, concrete and symbolic (concolic) software analysis are essential.
Ability to prepare technical reports and papers and to present findings to senior management and at technical conferences.
You’ll Bring These Qualifications:
An active DoD Top Secret.
7 years of overall software engineering experience.
Must possess an expert command of C/C++ programing, with knowledge of assembly language in one or more Instruction Set Architectures (ISA) and hardware platforms.
At least 4 years with relevant experience with finding, repairing, and/or exploiting software vulnerabilities
BS/MS degree in Computer Engineering, Computer Science, Electrical Engineering, or a related field. (Candidates currently enrolled in an MS accredited degree program relevant to this position will be considered)
Experience with debuggers, compilers, assemblers, linkers, source code extractors, and disassemblers for Windows and Linux
Experience with software reverse engineering tools and methods.
These Qualifications Would be Nice to Have:
Possessing a PhD degree or being a candidate for PhD is preferred but not required.
Experience with debuggers, compilers, assemblers, linkers, source code extractors, and disassemblers for Android, Apple OS X, and Apple iOS platforms
Experience with emulation such as QEMU, and code intermediate representation (IR).
US-Aberdeen Proving Ground-MD-BALTIMORE