Are you looking to put your problem-solving prowess to the test in a rapidly-evolving systems security research and development environment? You know that embedded/application developers, reverse engineers, and vulnerability analysts all play key roles in the capability development life cycle. As a Computer Network Operations (CNO) Capability Development Specialist, you’ll have the opportunity to use skills in reverse engineering of hardware, firmware and software, use reverse engineering tools, and your knowledge of C/C++ and assembly language, scripting language, debugging, computer architectures, and networking protocols to support our government intelligence clients. We’re looking for someone like you to have a direct impact on the nation’s security.
On our team, you’ll be involved in the full life cycle of reverse engineering projects involving various types of hardware, firmware and software. Working on an agile team of experts, you’ll perform reverse engineering and vulnerability analysis of diverse hardware and software problems. You’ll inform operational parameters for complex systems, as well as leverage various types of reverse engineering tools to influence the delivery of your work. You’ll determine what the art of the possible is – what can be done – and then you’ll bring it to life for your clients.
Are you ready to help us combat the most advanced adversaries?
Join us. The world can’t wait.
-Experience with software reverse engineering tools, including Ida Pro Hopper, x64, or Ghidra
-Experience with C and C++
-Experience with debuggers, compilers, assemblers, linkers, source code extractors, and disassemblers for Windows, Linux, Android, Apple OS X, or IOS platforms
-Experience with emulation, including QEMU or code intermediate representation (IR)
-Knowledge of Radamsa, Libfuzzer, American Fuzzy LOP, Defensics Hongguzz, or OSS-fuzz
-Knowledge of assembly languages
-Top Secret clearance
-HS diploma or GED
Nice If You Have:
-Experience with cyber
-Experience with Electronic Warfare
-Knowledge of IP Protocols
Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; Top Secret clearance is required.
Build Your Career:
Rewarding work, fun challenges, and a ton of investment in our people—that’s Booz Allen cyber. When you join Booz Allen, we’ll help you develop the career you want.
- Competitions — From programming competitions at our PyNights (Python competition and learning events) to competing in CTFs, we’ve got plenty of chances for you to show off your skills.
- Paid Research — Have an innovative idea to explore or hypothesis to test? You can participate in challenges via our crowdsourcing platform, the Garage, and other programs to be awarded dedicated time and/or funding to advance your skills.
- Cyber University — CyberU has more than 5000 instructor-led and self-paced cyber courses, a free online library that you can access from just about anywhere—including your phone—and certification exam prep guides that include practical assessments to prepare you for your exam.
- Academic Partnerships — In addition to our tuition reimbursement benefit, we’ve partnered with University of Maryland University College to offer two graduate certificate programs in cybersecurity—fully funded without a tuition cap.
- Maker/Hackerspaces — Race drones, print 3D gadgets, drink coffee from our Wi-Fi coffee maker, and get hands-on training on tools and tech from in-house experts in our dedicated maker and hackerspaces.
We’re an EOE that empowers our people—no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, veteran status, or other protected characteristic—to fearlessly drive change.