This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Do you enjoy the thrill of the hunt? Are you motivated by the head-to-head challenge of gaining access to well-protected networks? As a network exploitation professional, you know that understanding the adversaries’ tactics, techniques, and procedures are crucial to producing the intel that enables the success of mission owners. At Booz Allen, you can apply your vulnerability analysis, network mapping, exploitation, defensive, and IT logging process experience to execute offensive cyber operations that inform our nation’s most critical security missions. Safeguard the future with us and develop offensive cyber operations that are essential to providing national security for today and tomorrow.
Job Responsibility:
Apply vulnerability analysis, network mapping, exploitation, defensive, and IT logging process experience to execute offensive cyber operations
Develop offensive cyber operations that are essential to providing national security
Requirements:
Experience with using industry standard static and dynamic analysis tools, including disassemblers, debuggers, virtual machines, and hex editors
Experience in a scripting language such as Python or JavaScript
Experience with development or reverse engineering of Windows API targets
Experience with the identification and classification of malware families based on standard taxonomy and typical malware attack methodologies for both Windows and Linux
Knowledge of operating systems, including Windows, Linux, and Mac, application behaviors, and network traffic analysis to identify malware exploits
Experience with vulnerability research and exploitation methodologies such as fuzzing, shellcode, and leveraging memory corruption vulnerabilities
Ability to analyze shellcode, packed or obfuscated code, and the associated algorithms, and capture and interpret traces using Wireshark
Ability to read C/C++, C#, Go, Java, JavaScript, Python, or Rust
TS/SCI clearance with a polygraph
Bachelor's degree and 5+ years of experience in malware reverse engineering, or Master's degree and 3+ years of experience in malware reverse engineering
Nice to have:
Ability to read C/C++ and Python preferred
Master's degree in a related field
GREM Certification
OSED or OSEE Certification
What we offer:
Health, life, disability, financial, and retirement benefits