Skip to main content

This job has expired

Offensive Software Engineer SME

Employer
Leidos
Location
Reston, VA
Closing date
Dec 6, 2022

View more

*Description* *Job Description:* *Job Description* The ANNEX team in the Intel division at Leidos currently has an opening for an Offensive Software Engineer to work in the Reston area. In support of an Intel program, the engineer will develop, maintain and enhance complex and diverse cyber tools. The engineer will support research, engineering, and development of innovative solutions to support operational cyber missions. Work includes engineering robust infrastructure, end-point capabilities, and command and control systems. The successful candidates will have the opportunity to work independently and as part of a team. Primary Responsibilities * Conduct vulnerability and malware research and developing offensive capabilities against Mobile IoT and Network devices * Reverse engineer threats to determine methods of exploitation * Conduct research on innovative offensive tools and techniques, developing payloads, and manipulating code execution * Architecting application security and conducting software evaluations (known risks and/or static and dynamic code analysis) * Experience with/use of IdaPro or Ghidra on devices to evaluate products to identify vulnerabilities for exploitation * Recommending mitigations for, or patching known vulnerabilities * Assessing web application vulnerabilities, tracking code releases * Automating penetration testing and fuzzing * Configuration and implementation of data link, network, and transport layer protocols * Creating and developing multi-architecture cross-compiled projects * Apply understanding of technical issues surrounding the designing, building, and testing of cyber tools * Apply understanding of cryptographic protocols and compression technologies and their implementation in C/C++ * Understanding of computer, network exploitation techniques and methodologies to include application and mitigation techniques * Understanding of public exploits and awareness of new/unpublished techniques * Serve as a technical lead on large, complex projects. * Mentors and coaches other technical staff. Basic Qualifications * Master's degree and 15+ years of experience * May possess a Doctorate in technical domain * Viewed as a subject matter expert and within the field by peers within and outside the organization * Experience with ARM, PowerPC, and MIPS assembly * Operating System and Kernel level development experience * Vulnerability research or software reverse engineering skills Preferred Qualifications * Top Secret, SCI security clearance with polygraph * Operating System and Kernel level development experience * Understanding of operating system internals for Windows, iOS, Linux, and/or Android, such as process synchronization techniques (ie, semaphores, messages, threading), process scheduling, resource and device access * Mobile development experience *Clearance:* Candidates must be a US citizen at a minimum with the ability to obtain a TS/SCI level with Poly security clearance for consideration *Pay Range:*

Get job alerts

Create a job alert and receive personalized job recommendations straight to your inbox.

Create alert