Software Reverse Engineer jobs in United States
cer-icon
Apply on Employer Site
company-logo

Peraton · 8 hours ago

Software Reverse Engineer

Peraton is a next-generation national security company that drives missions of consequence spanning the globe. They are seeking a highly skilled and experienced Senior Software Reverse Engineer to perform in-depth analysis of software, firmware, and hardware systems to uncover functionalities, identify vulnerabilities, and understand operational contexts.

Information TechnologyRobotics
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Conduct comprehensive analysis of compiled software and binaries. Employ forensic techniques to extract critical artifacts, understand system architecture, and identify key software components
Utilize virtualization and sandboxing environments (VMware, KVM/QEMU) to run and observe software in its native operating environment. Perform system call tracing, network monitoring, and file system analysis to reveal real-time behaviors and interactions
Perform live, on-system debugging using tools like the GNU Debugger (GDB) to step through code execution in real-time. Correlate dynamic findings directly with static analysis from Ghidra to validate assumptions, understand complex logic, and uncover obfuscated functionality
Use advanced reverse engineering tools, with a focus on Ghidra, to decompile and disassemble software. Analyze code paths, extract indicators, and uncover hidden or malicious logic that is not apparent through dynamic analysis alone
Collaborate with analysts to integrate findings from system and operational documents. Use this context to understand the system's Concept of Operations (CONOPS), providing significance and priority to exploitation efforts
Investigate and identify vulnerabilities, undocumented features, and novel capabilities within the target system. Develop proof-of-concept exploits and assess their potential impact on operational dependencies. Model and Simulate specific features and functions to understand how the software was developed, compiled, and deployed
Employ a specialized toolchain for analysis, including disk imagers, virtual machine managers, network scanners, and debuggers to perform end-to-end exploitation
Mentor junior engineers in specific SWRE methodologies, tools, and techniques

Qualification

Software Reverse EngineeringDynamic AnalysisStatic AnalysisGhidraVirtualization PlatformsForensic AnalysisLinux/Unix ExpertiseLow-level ProgrammingNetwork AnalysisSecurity PracticesScripting LanguagesMentorship

Required

Bachelor's degree in Computer Science, Software Engineering, Information Security, or a related field (or equivalent experience) with 8+ years of relevant experience; OR Masters's degree in Computer Science, Software Engineering, Information Security, or a related field (or equivalent experience) with 6+ years of relevant experience; OR PhD in Computer Science, Software Engineering, Information Security, or a related field (or equivalent experience) with 3+ years of relevant experience
Minimum of 3+ years of relevant experience in software reverse engineering, with a preference for experience in materiel exploitation, malware analysis, or vulnerability research
Proven experience with virtualization platforms (VMware Workstation, KVM/QEMU) for dynamic analysis, sandboxing, and system emulation
Hands-on experience with forensic disk image analysis using tools like Autopsy and guestfish to mount, modify, and extract artifacts from raw disk images
Expertise in the SWRE toolchain, including Ghidra, GDB, Wireshark, MobaXterm, NMAP, and the Linux binutils suite (e.g., readelf, strace, ltrace, ldd)
Demonstrated ability to perform live debugging of complex applications using GDB, including setting breakpoints, inspecting memory, and analyzing program state to support reverse engineering efforts
Deep expertise in Linux/Unix environments, including system administration, network configuration, SSH key management (ssh-keygen, virt-customize), and advanced command-line tools
Strong knowledge of low-level programming (C, C++, Assembly) and experience with scripting languages like Python
Strong understanding of operating system internals, x86/x64 assembly, and CPU architecture
Experience with network analysis (Wireshark, nmap) to baseline system behavior and identify communication protocols
Experience handling non-standard system configurations, including foreign language character sets and legacy hardware emulation
A solid understanding of common security practices and the ability to identify security flaws in software architecture
TS/SCI with ability to obtain a poly

Benefits

Medical
Dental
Vision
Life
Health savings account
Short/long term disability
EAP
Parental leave
401(k)
Paid time off (PTO) for vacation
Company paid holidays

Company

Peraton Fearlessly solving the toughest national security challenges.

Funding

Current Stage
Late Stage

Leadership Team

leader-logo
Thomas Terjesen
Chief Information Officer
linkedin
Company data provided by crunchbase