Description
SAIC, a leading provider of systems development & deployment, targeting & intelligence analysis, systems engineering & integration, and training capabilities and solutions for the Intelligence Community, is seeking creative and dedicated professionals to fulfill their career goals and objectives while delivering mission excellence on programs of national importance.
The Technical Exploitation Intelligence Support team is critical in supporting DoD, Federal, and IC partners’ Global War on Terrorism efforts by providing state of the art technical exploitation and collection capabilities in digital media exploitation triage and automation, advanced technical Media Exploitation (MEDEX), and advanced Mobile Device Exploitation.
This position will include the following duities:
Isolate, review, analyze, and reverse-engineer potentially malicious programs
Write and produce high quality technical reports related to the scope, nature, and characteristics of the malicious software suitable for distribution to both technical and non-technical audiences
Work deep within the boot process, kernel, and system internals to devise novel solutions using tools like IDA Pro, debuggers, and in-target probes to examine behavior of binaries
Analyze software and firmware using reverse engineering techniques to understand security vulnerabilities, working closely with teammates who value innovation and execution
Share knowledge by clearly articulating ideas through papers and presentations to technical staff, management and customer decision makers
Take advantage of opportunities to participate in working groups, customer meetings, proposal writing, and conferences
Provide detailed understanding of how various attacks work at the memory and register level
Perform in-depth analysis (dynamic/static) on malicious software (i.e., bots, worms, Trojans) resident on Microsoft® Windows and UNlX® based platforms to provide actionable intelligence; as appropriate, provide remediation recommendations
Analyze, disassemble, and reverse engineer malicious code; document and transition results in reports, presentations and technical exchanges
Using existing framework and within design, prototype, document, test and transition malicious code analysis methods and tools appropriate for operational use
Proactively identify, define and advocate reverse engineering and analysis processes, approaches and concepts to enhance/improve technical exploitation efforts
Adequately explain, present, demonstrate [when applicable] and document the operational impact of a particular 'vulnerability
Qualifications
TS/SCI is required. A CI Poly is preferred or be willing and able to obtain a CI Poly.
Education: BS degree in Computer Science or Engineering (Software, Computer) or an additional 4 years of related expeirence
Two (2) Years experience with computer forensic software packages such as EnCase, FTK, or Sleuth Kit/Autopsy
Advanced or Expert experience with reverse engineering and network security tools, including Ida Pro, Immunity Debug, WinDdg, VIM, Emacs, Trace32/JTAG, GDB, make, ctags, git, mercurial, and/or Wireshark
Expert level Programming knowledge/experience with either Windows Kernel, C, C++, Python or Assembly Language and the ability to work in a team environment.
Advanced or Expert level experience in hardware configuration and network/data communications
Advanced or Expert level experience conducting intelligence analysis and writing finished intelligence reporting with high quality and with minimal revision
Thorough understanding of compiler specifics, operating system concepts, security models, and the causes of most vulnerabilities and how to exploit them Preferably, experience coding and disassembling software on both Windows and Linux or other BSD and Unix variants
Advanced or Expert knowledge of the types and techniques of cyber exploitation and attack, including virus, worm, Trojan horse, logic bomb, and sniffer to identify, quantify, prioritize, and report vulnerabilities in enterprise architecture, networks, communications, applications, and systems
Ability to establish defense mechanisms to detect and deflect Cyber-attacks on networks and communications systems and structures and design and evaluate applications that are secure from known and potential methods of Cyber-attack
Ability to coordinate systems implementation activities with key personnel to ensure the successful transition from development to implementation and operation, present and defend a position, and to communicate with government and contractor team members
Experience with virtualization, driver programming, and debugging
Previous experience with ethical hacking and/or testing vulnerabilities
Advanced or Expert experience with diagnosing and debugging software system
Covid Policy: SAIC does not require COVID-19 vaccinations or boosters. Customer site vaccination requirements must be followed when work is performed at a customer site.
Overview
SAIC® is a premier Fortune 500® technology integrator driving our nation's technology transformation. Our robust portfolio of offerings across the defense, space, civilian, and intelligence markets includes secure high-end solutions in engineering, digital, artificial intelligence, and mission solutions. Using our expertise and understanding of existing and emerging technologies, we integrate the best components from our own portfolio and our partner ecosystem to deliver innovative, effective, and efficient solutions that are critical to achieving our customers' missions.
We are more than 26,500 strong; driven by mission, united by purpose, and inspired by opportunities. SAIC is an Equal Opportunity Employer, fostering a respectful work culture based on diversity, equity, and inclusion that values all contributors. Headquartered in Reston, Virginia, SAIC has annual revenues of approximately $7.1 billion. For more information, visit saic.com.