Senior Software Developer w/ Reverse Engineer experience - San Antonio
Role details
Job location
Tech stack
Job description
In this position you will work as a technical expert in the design, development, assessment, and fielding of advanced cyber capabilities and software solutions supporting offensive, defensive, and command and control (C2) cyberspace operations. Operating within a complex and dynamic mission environment, this position is integral to supporting Air Force Cyberspace Command and U.S. Cyber Command objectives. The incumbent develops, modifies, and maintains mission-critical software and cyber tools, and manages high-impact projects to enable operational readiness and capability advancement., * Repurpose existing binaries
-
Develop Python (or similar) plugins
-
Repurpose existing software applications
-
Identify communication protocols
-
Test and validate plugins
-
Generate requisite documentation describing functionality and usage
-
Participate in code reviews
-
Integrate tools with command-and-control (C2) frameworks, ensuring reliability, encryption, and secure communications across various operational environments.
-
Provide technical mentorship to junior developers; enforce secure coding practices and development standards.
-
Develop automated testing, CI/CD pipelines, and operational deployment scripts to support rapid capability integration.
-
Design, document, and implement end-to-end features from database to UI
Requirements
Do you have experience in VMware?, Candidate must be capable of working in a fast-paced. The successful candidate must have 5+ years of recent system/software engineering experience with a strong understanding of reverse engineering methodologies and techniques. The candidate will possess and maintain required skills to include, but not limited to:
-
Full stack development (i.e., front-end and back-end)
-
Strong knowledge of databases
-
Data serialization techniques
-
RESTful APIs
-
Virtualization/containerization (VMware and Docker)
-
Ansible experience
-
CI/CD pipeline methodologies
-
Documentation as Code
-
Packers
-
Terraform/Infrastructure as code
-
Experience in working on large software platforms/systems of systems/ and microservices
-
Code optimization techniques
-
Familiarization with malware analysis techniques
-
Perform in a DevOps environment
-
Ida Pro and/or Ghidra experience
-
Malware Analysis
-
Understanding of application internals and security strengths and weaknesses
-
Static and dynamic binary analysis
-
Network protocols/packet analysis
-
Binary modification methods
PROGRAMMING LANGUAGES
-
Python, JavaScript, Bash, Powershell, familiarity with compiled languages, such as .NET, C, Golang, Rust
-
Assembly (x86, ARM)
NICE TO HAVE EXPERIENCE:
-
Familiarity with DoD, Air Force, and national-level cyber policies, procedures, and security protocols for handling classified materials.
-
Experience with DoD networks.
-
Strong coding proficiency in supported languages and secure software development frameworks.
-
Advanced project management skills, including planning, scheduling, and risk assessment for complex, multi-agency projects.
-
Excellent communication abilities, capable of preparing and presenting technical reports, briefings, and decision papers for senior leadership.
-
Ability to adapt to evolving technologies, foresee technological impacts, and tailor tools and practices to specific mission sets.
-
Binary Manipulation (i.e. Hex Editors, File headers, file types)
-
Wireshark (or similar) network analysis tools, * Must have or obtain a security clearance (TS/SCI)