Red Arch Solutions is a proven and effective small business IT integrator and consultant, recognized as a leading IT provider to the Federal Government, primarily focused within the Intelligence Community. We provide our customers with state-of-the-art tactical and strategic intelligence, systems, and software engineering solutions, solving some of the most pressing and unique intelligence community challenges related to national security. Our employees are exceptionally skilled professionals. We recruit individuals who are dedicated to collecting, analyzing, and disseminating critical information to national leaders. Our engineers design, develop, and deploy mission critical solutions to support our war fighters. We are also an official AWS Partner and are pleased to now offer Cloud Solutions Architecture and Engineering using Amazon Web Services. Position Overview: Red Arch is looking for a Reverse Engineer to join our team! We are seeking a talented and multi-faceted Reverse Engineer to be responsible for performing reverse engineering research on highly complex software applications. This research will involve static and dynamic analysis including reverse engineering and kernel debugging. Research results will be encapsulated in written reports and or software tools. The candidate will be working alongside some of the world's best reverse engineers, learning unique skills and exploring challenging problems every day. Requirements Requirements: * TS/SCI with polygraph.
* 1+ (CAP1) or 6+ (CAP2) or 8+ (CAP3) years of development experience with Assembly, C/C++, or Python.
* Knowledge of common binary executable formats (PE, ELF, etc.)
* Experience with IDA Pro, Ghidra, or similar binary analysis tools.
* Experience with analyzing user-mode binaries and kernel-mode drivers.
* Experience with Wireshark and network protocols. #CJ
* 1+ (CAP1) or 6+ (CAP2) or 8+ (CAP3) years of development experience with Assembly, C/C++, or Python.
* Knowledge of common binary executable formats (PE, ELF, etc.)
* Experience with IDA Pro, Ghidra, or similar binary analysis tools.
* Experience with analyzing user-mode binaries and kernel-mode drivers.
* Experience with Wireshark and network protocols. #CJ