What are the responsibilities and job description for the Cyber Engineer position at Cryptic Vector?
Description
At Cryptic Vector, we are dedicated to mission success. We take the time to understand our customers' needs, delivering products that perform when our nation needs them most. We understand that properly supporting the most unique missions of the United States government requires the nation’s best. Our focus is on creating a culture where the best and brightest want to grow, learn, and stay. If coming up with out-of-the-box solutions is your specialty, then you’ll feel right at home at Cryptic Vector. We are solving the country’s most unique problems in an environment where problem solvers and hard workers thrive. We've replaced corporate red tape with transparency and servant leadership. Honestly, it’s hard not to love this culture!
We value the individual experiences that our team members add to our culture and capabilities. Please don't hesitate to apply even if you don't meet the exact qualifications! We are interested in varying levels of experience.
Cryptic Vector is looking for Cyber Engineers with experience or interest in offensive cyber engineering. Cyber Engineering at Cryptic Vector is a research and development position spanning a variety of disciplines.
The responsibilities of the Cyber Engineer position may include the following:
- Reverse Engineering (RE) of software/firmware, Vulnerability Research (VR), exploit development/productization
- Design/develop post-exploitation effects in software/firmware, which can withstand scrutiny and attack
- Design/develop secure, reliable, software-based communication solutions
- Design/develop stealth solutions
- Collaborate with engineering teams and product end users to translate customer/business/technical requirements into architectural designs and software solutions
- Write unit tests, functional tests, and end-to-end tests
- Provide constructive code reviews for colleagues
Programming languages:
- Direct and recent experience coding in C and/or C
- Interest in new systems programming languages
- Proficiency in modern scripting languages (like Python) is important but not central
An ideal candidate for these positions will have:
- Experience developing user-mode applications for traditional platforms (Windows, Linux, macOS, Android, iOS) or user/kernel-mode capabilities for non-traditional platforms (embedded/proprietary/custom firmware or operating systems)
- A hacker mindset. Interest analyzing software/firmware for weaknesses.
- Participation or interest in Capture the Flag (CTF)/hacking competitions
- Interest in the architecture/internals of proprietary operating systems
- Comfort working with assembly, machine code, hexadecimal, and binary. Familiarity with reverse engineering tools, such as IDA Pro and/or Ghidra.
- Experience using, analyzing, and manipulating old/new network protocols. Interest in network/socket programming using TCP/UDP.
- Working knowledge of basic cryptography functions and programming
- Humble confidence, with a desire to work in a team setting (perhaps using an agile methodology)
- Familiarity with software engineering methods/process. Familiarity with CI/CD pipelines and best practices.
Requirements
- Preference for B.S. degree in Computer Science, Cyber Operations, Computer Engineering, Electrical Engineering, or related field
- Ability to obtain/maintain a US security clearance
- Willing to work in the greater Cincinnati area