We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

Reverse Engineer

22nd Century Technologies, Inc.
United States, Virginia, Newington
Oct 29, 2025

Job Title: Reverse Engineer

Location with zip code: Newington, VA 22122

Duration: FTE

Job Description:

Reverse Engineer:



  • We are seeking Software Developers and Reverse Engineers to support the FBI's- Reverse Engineering and Presentation team. You will work closely with government supervisors, product owners, and fellow developers to design, build, and deliver high-impact software solutions using Agile methodologies.
  • Your work will directly support mission-critical operations and national security initiatives.
  • This role demands deep technical experience, leadership skills, and operational awareness, especially in reverse engineering, secure software development, and data visualization for law enforcement.


Role & Responsibilities:



  • Perform static and dynamic analysis of binaries, executables, and firmware to determine functionality, origin, and potential threats.
  • Reverse engineer malicious software samples (Windows, Linux, Android, or embedded systems) to identify behavior, command-and-control mechanisms, and indicators of compromise (IOCs).
  • Decompile and analyze proprietary software and closed-source applications to understand algorithms, encryption schemes, and communication protocols.
  • Develop custom scripts, tools, and plugins (e.g., IDAPRO, Ghidra scripts) to automate or enhance analysis workflows.
  • Create detailed technical reports, including disassembly annotations, control-flow graphs, and mitigation recommendations.
  • Collaborate with red/blue teams, software developers, and threat hunters to improve detection capabilities and enhance defensive measures.
  • Support digital forensics and incident response teams with technical insight from reverse-engineered samples.
  • Participate in vulnerability research and exploit development for mission or defensive purposes.
  • Ensure analysis and artifacts comply with security policies, chain-of-custody standards, and classified handling procedures.
  • Candidates are not expected to have hands-on experience with every technology listed below. Instead, we seek individuals with strong analytical foundations, deep understanding of system internals, and demonstrated proficiency in one or more reverse engineering domains (e.g., malware analysis, binary instrumentation, or firmware analysis).


Required Skills:



  • Reverse Engineering Tools: IDA Pro, Ghidra, Radare2, Binary Ninja, OllyDbg, WinDbg, x64dbg, or similar.
  • Disassembly/Debugging Skills: x86/x64, ARM, MIPS assembly, decompilers, and symbol analysis.


Programming Languages:



  • Proficiency in C, C++, and Python; familiarity with Go, Rust, or Java a plus.
  • Scripting & Automation: IDA Python, Ghidra scripting, or custom static analysis automation using Python or Bash.
  • Malware & Threat Analysis: Familiarity with packers, obfuscation techniques, anti-debugging, and sandbox evasion methods.


Network & Protocol Analysis:



  • Wireshark, TCPDump, and analysis of network traffic generated by binaries.
  • Operating Systems: Deep understanding of Windows internals, Linux kernel, and possibly embedded/RTOS environments.


Security Knowledge:



  • Understanding of exploit mitigation (ASLR, DEP, CFG), memory forensics, and secure coding practices.


Version Control & Documentation:



  • Experience with Git, Jira, Confluence, or similar tools for maintaining traceability of findings.

Applied = 0

(web-675dddd98f-rz56g)