Назад
Company hidden
8 часов назад

Senior Principal Reverse Engineer (Cybersecurity)

Формат работы
onsite
Тип работы
fulltime
Грейд
senior
Английский
c1
Страна
US
Вакансия из списка Hirify.GlobalВакансия из Hirify Global, списка международных tech-компаний
Для мэтча и отклика нужен Plus

Мэтч & Сопровод

Для мэтча с этой вакансией нужен Plus

Описание вакансии

Текст:
/

TL;DR

Senior Principal Reverse Engineer (Cybersecurity): Conducting comprehensive hardware reverse engineering of OT and ICS devices to support forensic investigations of compromised edge systems with an accent on identifying embedded malware and proprietary hardware vulnerabilities. Focus on analyzing novel processor architectures, extracting malicious modifications, and developing defensive countermeasures for critical infrastructure.

Location: Arlington, VA. Must have U.S. Citizenship and active TS/SCI clearance.

Company

hirify.global provides technically advanced cyber, data operations, and intelligence mission support services to government and commercial markets.

What you will do

  • Conduct hardware reverse engineering of OT and ICS devices and network-edge systems.
  • Identify and extract deeply embedded malware from hardware components.
  • Reverse engineer firmware and low-level software on embedded devices.
  • Analyze proprietary communication protocols and identify hardware backdoors or implants.
  • Collaborate with electrical engineers on chip-off forensics and research emerging threats.
  • Develop SOPs for hardware forensics and train analysts on RE techniques.

Requirements

  • U.S. Citizenship and active TS/SCI clearance are mandatory.
  • Ability to obtain DHS Suitability.
  • 10+ years of experience in hardware reverse engineering or embedded systems analysis.
  • Proficiency with reverse engineering tools such as IDA Pro, Ghidra, and Binary Ninja.
  • Deep understanding of ARM, MIPS, and PowerPC architectures.
  • Bachelor’s degree in Electrical Engineering, Computer Engineering, or a related discipline.

Nice to have

  • Experience with SCADA, PLC, and RTU industrial control components.
  • Advanced certifications such as GREM or GXPN.
  • Experience with chip decapsulation and invasive hardware analysis.
  • Background in offensive security or penetration testing of OT environments.

Culture & Benefits

  • Opportunity to work on high-impact missions for the U.S. Government.
  • Access to state-of-the-art microelectronics exploitation laboratories.
  • Collaborative, research-oriented work environment.
  • Focus on solving the most demanding challenges in cybersecurity and intelligence.

Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →