Job Number: R0006994
Booz Allen Hamilton has been at the forefront of strategy and technology for more than 100 years Today, the firm provides management and technology consulting and engineering services to leading Fortune 500 corporations, governments, and not-for-profits across the globe. Booz Allen partners with public and private sector clients to solve their most difficult challenges through a combination of consulting, analytics, mission operations, technology, systems delivery, cybersecurity, engineering and innovation expertise.
Help enable law enforcement pursuit of criminals and threat actors with a variety of digitalinvestigative tools. Work as a security researcher and software developer in a team designing sophisticated engineering capabilities for use in lawful investigations of digital evidence. Conduct system vulnerability assessments across multiple platforms, including Android, iOS, Linux, Windows, and other related platforms. Leverage reverse engineering expertise to discover implementation failures in firmware, cryptographic protocols, and update procedures. Identify possible sources of information leakage and code exploitation opportunities. Write code to simulate and exploit vulnerabilities and document findings in an internal knowledge base. This position is located in Quantico, VA.
-3+ years of experience with software development using C/C++ or assembly
-2+ years of experience with reverse engineering software using disassemblers and debuggers, including IDA Pro and gdb
-1+ years of experience with developing or maintaining software or firmware for iOS, Android, or other embedded, non-x86 platforms
-Knowledge of computer architecture, including x86, ARM, MIPS, Power PC, or x86_64
-Ability to manage multiple assignments and adjust priorities based on mission requirements
-BS degree in Computer Science or Computer Engineering
-Experience with hardware debugging or interface methods, including JTAG, UART, or I2C
-Experience with higher-level languages, including Java, Objective-C, or Python
-Experience with firmware development, volatile memory manipulation, and software hooking
Applicants selected will be subject to a securityinvestigation and may need to meet eligibility requirements for access to classified information; Secret clearance is required.