Parsons Corporation Software Engineer (Reverse Engineer) in Annapolis Junction, Maryland
Minimum Clearance Required to Start:
Top Secret SCI w/Polygraph
We are a global industry leader harnessing the power of innovation for people who want to change the world and help our customers solve their most complex challenges. We're a company of thinkers, innovators, and protectors. Our people don't just generate big ideas-they bring them to life. Ready to be part of a cutting edge growing Cyber Security project that will make a huge impact on the DOD/Intel community? This exciting program includes performing software engineering, reverse engineering, and vulnerability research with a focus on OCO (Offensive Cyber Operations) and DCO (Defensive Cyber Operations) activities. Support assessments of large-scale weapons systems and other national security operations. We need our developers to be versatile, display leadership qualities and be enthusiastic to tackle new challenges across the full stack as we continue to push security forward.
Performing Software Engineering and vulnerability research with a focus on OCO (Offensive Cyber Operations) and DCO (Defensive Cyber Operations) activities.
Work with customers directly performing full cycle system engineering, gathering requirements and source code, to technical documentation and specifications.
Performing long term, in depth vulnerability assessments using reverse engineering, kernel debugging, and exploitation technologies.
Engineers are encouraged to be creative and exhaust every technical avenue to uncover weaknesses of the system and exploit them.
The feasibility and impact of the findings will often require team members to develop prototype exploitation based on identified vulnerabilities.
H.S. diploma and 5 + years in software development and maintenance
Bachelor's degree in Computer Science/Engineering or related field, can be applied for 4 years credit; Master's degree in Computer Science/Engineering or related field, can be applied for 6 years credit
Experience in x86/x64 assembly, software reverse engineering, kernel debugging, and protocol stacks
Experience developing computer exploits
Active TS/SCI with Polygraph clearance
Experience in Software Reverse Engineering with at least 1 of the following tool or an equivalent: IDAPro, GDB, WinDbg, Immunity/OllyDbg.
Experience in malware analysis and mitigation techniques.
Strong understanding of the Windows and Linux Operating System internals and APIs.
Knowledge of analyzing shellcode, packed and obfuscated and the associated algorithms a plus.
Experience with scripting languages such as Python, Bash, Pearl, etc.
Experience in host and network analysis to identify and characterize anomalies and vulnerabilities in the platform.
Experience documenting findings in reports and briefings.
Security certifications a plus: CISSP, C|EH, CREA, GPEN, GREM, OSCP, OSCE.
Position is location in Annapolis Junction with some travel and meetings to Linthicum Heights area. Occasional CONUS and OCONUS travel will occur as well.
Must be able to obtain, maintain and/or currently possess a security clearance.
Parsons is an equal opportunity, drug-free employer committed to diversity in the workplace. Minority/Female/Disabled/Protected Veteran/LGBTQ+. All qualified applicants will receive consideration for employment without regard to an individual’s race, color, religion, national origin, ethnicity, union affiliation, age, sex, sexual orientation, gender identity and expression, pregnancy, employable physical or mental disability, veteran status, genetic information, immigration status, or any other basis protected by all applicable laws.