Latitude
Software Engineer - Reverse Engineering
Latitude, Greendale, Wisconsin, United States, 53129
LatitudeLatitude Inc is an organization providing staffing solutions and government services for companies and public sector.
Overview:
We are seeking a highly skilled Software Engineer specializing in Binary Analysis and Reverse Engineering. The ideal candidate will possess deep knowledge of low-level programming, reverse engineering techniques, and experience working with various disassembly tools and debuggers. You will work on analyzing compiled code, uncovering vulnerabilities, and developing tools for automated binary analysis. This role is critical in improving system security, detecting malware, and developing solutions to mitigate vulnerabilities in software products.
Responsibilities:
Binary Analysis:
Analyze compiled binary code to identify vulnerabilities, security risks, and performance inefficiencies.
Perform static and dynamic binary analysis to understand code execution and behavior.
Work with a variety of architectures (x86, ARM, etc.) and operating systems to understand how compiled programs function at the binary level.
Reverse Engineering:
Reverse engineer malware, software, and firmware to identify vulnerabilities and understand malicious behavior.
Utilize disassembly tools such as IDA Pro, Ghidra, Radare2, or Binary Ninja to deconstruct binaries and analyze code paths.
Collaborate with security teams to develop solutions for detecting and mitigating reverse engineering risks.
Vulnerability Research:
Conduct vulnerability assessments and penetration testing to identify security weaknesses in software products.
Collaborate with software development teams to patch vulnerabilities, improve code security, and enhance performance.
Stay updated on the latest research and techniques in reverse engineering, binary analysis, and exploit development.
Tool Development:
Develop and maintain custom tools for binary analysis, automation of reverse engineering tasks, and vulnerability detection.
Create scripts and utilities that improve reverse engineering efficiency and the ability to analyze large volumes of binaries.
Contribute to open-source projects in the reverse engineering and binary analysis domain, if applicable.
Collaboration and Documentation:
Work closely with security, engineering, and product teams to ensure vulnerabilities are identified early and resolved efficiently.
Document findings and analysis in technical reports for both technical and non-technical stakeholders.
Provide mentorship and guidance to junior engineers in the areas of binary analysis and reverse engineering.
Qualifications:
Bachelor’s or Master’s degree in Computer Science, Computer Engineering, or a related field.
3-5+ years of experience in software development with a focus on binary analysis, reverse engineering, or low-level programming.
Proficiency in one or more low-level programming languages such as C, C++, or Assembly.
Experience with reverse engineering tools such as IDA Pro, Ghidra, Radare2, or Binary Ninja.
In-depth knowledge of operating systems, file formats, and binary execution environments.
Strong understanding of common vulnerability types (e.g., buffer overflows, use-after-free, etc.) and how they manifest in compiled code.
Excellent problem-solving skills and the ability to think critically in analyzing software binaries.
#J-18808-Ljbffr
Overview:
We are seeking a highly skilled Software Engineer specializing in Binary Analysis and Reverse Engineering. The ideal candidate will possess deep knowledge of low-level programming, reverse engineering techniques, and experience working with various disassembly tools and debuggers. You will work on analyzing compiled code, uncovering vulnerabilities, and developing tools for automated binary analysis. This role is critical in improving system security, detecting malware, and developing solutions to mitigate vulnerabilities in software products.
Responsibilities:
Binary Analysis:
Analyze compiled binary code to identify vulnerabilities, security risks, and performance inefficiencies.
Perform static and dynamic binary analysis to understand code execution and behavior.
Work with a variety of architectures (x86, ARM, etc.) and operating systems to understand how compiled programs function at the binary level.
Reverse Engineering:
Reverse engineer malware, software, and firmware to identify vulnerabilities and understand malicious behavior.
Utilize disassembly tools such as IDA Pro, Ghidra, Radare2, or Binary Ninja to deconstruct binaries and analyze code paths.
Collaborate with security teams to develop solutions for detecting and mitigating reverse engineering risks.
Vulnerability Research:
Conduct vulnerability assessments and penetration testing to identify security weaknesses in software products.
Collaborate with software development teams to patch vulnerabilities, improve code security, and enhance performance.
Stay updated on the latest research and techniques in reverse engineering, binary analysis, and exploit development.
Tool Development:
Develop and maintain custom tools for binary analysis, automation of reverse engineering tasks, and vulnerability detection.
Create scripts and utilities that improve reverse engineering efficiency and the ability to analyze large volumes of binaries.
Contribute to open-source projects in the reverse engineering and binary analysis domain, if applicable.
Collaboration and Documentation:
Work closely with security, engineering, and product teams to ensure vulnerabilities are identified early and resolved efficiently.
Document findings and analysis in technical reports for both technical and non-technical stakeholders.
Provide mentorship and guidance to junior engineers in the areas of binary analysis and reverse engineering.
Qualifications:
Bachelor’s or Master’s degree in Computer Science, Computer Engineering, or a related field.
3-5+ years of experience in software development with a focus on binary analysis, reverse engineering, or low-level programming.
Proficiency in one or more low-level programming languages such as C, C++, or Assembly.
Experience with reverse engineering tools such as IDA Pro, Ghidra, Radare2, or Binary Ninja.
In-depth knowledge of operating systems, file formats, and binary execution environments.
Strong understanding of common vulnerability types (e.g., buffer overflows, use-after-free, etc.) and how they manifest in compiled code.
Excellent problem-solving skills and the ability to think critically in analyzing software binaries.
#J-18808-Ljbffr