Future need - not a current vacancy. If you apply, this could be a multi-year process. Location: Vienna, VA
This is a forensic software development and reverse engineering position combined into one! The candidate will be primarily focused on conducting software Reverse Engineering activities using a combination of static and dynamic tools. Additionally, the candidate will provide support in the form of application development, scripting, debugging, and value-added software development expertise to a digital forensic lab, while maintaining existing software and develop new software to customer specifications. Regardless of whether you are applying to a software developer or reverse engineer position, if your application is approved, we will test you on both skills as part of our hiring process. At this time, the majority of our open positions require an aptitude in both domains.
Requirements:
Desirable:
Benefits:
Remote work is not an option. We do offer relocation assistance. Please see our careers page or inquire with your recruiter about the terms and conditions.
Salary and other compensation: The hourly rate of pay ranges from $43.27 - $96.15. The salary range for this position is subject not only to the hire's skills, education, expertise, and years of experience, but also to features of the final position offered to the hire: including, but not limited to the location of the position, clearance required for the position, and the contract associated with the position. See our perks and benefits page for a general description of benefits and other potential compensation benefits.
About Us: At Cipher Tech Solutions, Inc. (Cipher Tech), we take great pride in supporting some of the most mission critical work in the Department of Defense and the Intelligence Community. The majority of our company is comprised of extremely talented software developers who write production tools which directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and processing evidence from computers, phones, tablets, cameras, flash-drives, and just about any other form of digital media. The results of our work are then used to support federal and military law enforcement, counterintelligence, and counter terrorist activities.