You will be supporting a project primarily consisting of three components, an IDA Pro Python plugin, a web interface, and a Java backend. The software uses both MongoDB and Neo4j databases. We don't expect you to know our exact technology stack, but due to the wide range of tools used in this project, the ability to pick up new technologies quickly is important.
The project team is small, so you'll be working on the whole stack and implementing features from front to back. Because of the small team and fast-paced environment, you should be an adaptable generalist who is willing to acquire new skills as necessary. The development team is split between our Boston and Maryland offices, so effective communication skills are a must.
US citizenship (no exceptions)
Bachelor's degree in computer science or electrical/computer engineering
Ability to read and understand assembly code
Self-motivated, detail-oriented, strong work ethic
Strong object oriented programming skills
Proficiency in one of the following: C, C++, C#, Java, Python
At least 1 year of prior professional programming experience
Ability to quickly learn new skills, tools, and languages.
Experience with Java or Python
Experience with IDA or IDA Python scripting
Experience with any disassembler
Familiarity with Neo4j or other graph databases
Familiarity with NoSQL or MongoDB
Fluency in x86 and x64 assembly
Experience with reverse engineering
Casual work environment
Monthly LAN parties
At Cipher Tech Solutions, Inc. (Cipher Tech), we take great pride in supporting some of the most mission critical work in the Department of Defense and the Intelligence Community. The majority of our company is comprised of extremely talented software developers who write production tools which directly support one of two missions: digital forensics and malware reverse engineering.
Digital forensics is the practice of extracting and processing evidence from computers, phones, tablets, cameras, flash-drives, and just about any other form of digital media. The results of our work are then used to support federal and military law enforcement, counter intelligence, and counter terrorist activities.
Malware reverse engineering is the practice of analyzing extremely advanced malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as:
How did it infect the victim's computer What kind of information it is seeking to steal How is it communicating with the author (actor) Who that actor might be
Be aware that you are applying for a job that requires a U.S. Government Security Clearance.
The U.S. government will not issue security clearances to recent users of illegal drugs. On your application to us, you must acknowledge that you have not engaged in any illegal drug use within the past twelve months (illegal drug use includes, but is not limited to, the use of illegal substances, the misuse of prescriptions, the misuse of over-the-counter substances, and the use of medical or recreational marijuana that may be deemed legal at the state level but is still considered illegal by the federal government).
NOTE: CIPHER TECH WILL NOT DISCRIMINATE AGAINST ANY QUALIFIED APPLICANTS WITH A DISABILITY, INCLUDING ILLEGAL DRUG USERS WHO HAVE RECENTLY SOUGHT PROFESSIONAL TREATMENT FOR A DRUG PROBLEM.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity or national origin.
Apply now to have the opportunity to be considered for similar jobs at leading companies in the Seen network for FREE.
Zero stress and one profile that can connect you directly to 1000s of companies.
We’ll take it from there. After you tell us what you’re looking for, we’ll show you off to matches.
Boost your interview skills, map your tech career and seal the deal with 1:1 career coaching.
Join now and Be Seen.