ManTech Mission, Cyber and Intelligence Solutions (MCIS) Group has an exciting opportunity for a Software Vulnerability Researcher in the Aurora, CO area! Are you passionate about understanding how the modern software ecosystem works? Do you value intellectual honesty? Do you enjoy the process of problem solving? Is there more to software security than adjacent memory corruption? Do you like flexible hours, hard problems, open questions, success and failure?
ManTech is dedicated to hiring the best of the best, and in order to do so we offer great pay and excellent benefits.
Major Job Functions:
•Reverse engineer software for security mechanism bypass
•Develop computer code in multiple languages as applicable
•Develop instrumentation in support of primary tasks
•Follow Agile Scrum methodology
•Take self initiative to remain knowledgeable of evolving trends in offensive and defensive cyber tools, tactics, and procedures
•Perform as a team member in the research of software vulnerabilities
•Perform as a team lead on projects when suitable
•Individuals must be a U.S. Citizen and either hold an active US Security Clearance or must be eligible to obtain a US
•Applicants with the appropriate skills but without a security clearance are still encouraged to apply. If you’re the right fit for the job, we’ll make it happen.
•Applicants will be subject to a government security background investigation.
•Bachelor's degree or equivalent combination of education and experience
•Bachelor’s degree in one of the following disciplines: Computer Engineering, Computer Science, Math, Software Engineering or a related field preferred
•A passion for low-level software development and engineering
•Knowledge of operating system fundamentals, including interrupts, threading, virtual memory, device drivers, boot procedures, and memory management techniques
•Knowledge of operating system internals, development and integration of code within the operating system kernel, kernel debugging, assembly (x86 and 64-bit Intel / AMD, MIPS)
•Knowledge of file systems, networking, and protocol stacks
•In-depth knowledge of Microsoft Windows internals
•In-depth knowledge of compilers, operating systems, and/or program analysis
•Experience in reverse engineering
•Experience in vulnerability research
•Experience in C and C++ programming
Requires Bachelor’s degree or equivalent and ten to twelve years of related experience with a minimum of four years experience in one or more of the following: computer network penetration testing and techniques; computer evidence seizure, computer forensic analysis, and data recovery; computer intrusion analysis and incident response, intrusion detection; computer network surveillance/monitoring; network protocols, network devices, multiple operating systems, and secure architectures or Master’s degree and seven to nine years of related experience. Ability to obtain a security clearance.