
Reverse Engineer All Levels
Adaptic, Corridor North, MD, United States
Break What Others
Can't: Join us as a Reverse Engineer!
At Adaptic, reverse engineers dive beneath the surface—analyzing software, uncovering vulnerabilities, and understanding systems at their core. Supporting the DoD and Intelligence Community, you'll help expose how technologies work, where they break, and how they can be leveraged to support mission needs.
Whether you're early in your career or leading advanced analysis efforts, we're looking for Reverse Engineers at all levels who are curious, analytical, and driven to solve complex technical challenges.
Your Impact
You’ll work across software and systems to analyze, deconstruct, and understand technologies at a fundamental level. Day-to-day, that can look like:
Performing reverse engineering and debugging on software, binaries, and system components
Identifying software defects, vulnerabilities, and potential exploitation paths
Researching open-source and emerging vulnerabilities to assess system risk
Developing methods and techniques to determine if running software is vulnerable
Analyzing malicious binaries, malware, and adversary techniques
Supporting identification of risks and providing mitigation strategies
Working with low-level code, including assembly and compiled languages
Leveraging industry-standard reverse engineering tools (e.g., Ghidra, IDA Pro, debuggers)
Analyzing system behavior across operating systems, memory, and processes
Supporting development of proof-of-concept code, scripts, or analysis artifacts
Automating reverse engineering and analysis workflows where possible
Collaborating with cross-functional teams to support mission objectives
Qualifications
All positions require an active TS/SCI with polygraph
Experience with low-level programming and assembly language
Proficiency in C, C++, Python, or similar languages
Experience using reverse engineering tools and techniques
Strong understanding of system internals (operating systems, memory, binaries)
Experience analyzing complex or malicious code and identifying vulnerabilities
Familiarity with networking concepts and how systems communicate
Ability to problem-solve in complex, mission-driven environments
A degree in Computer Science, Computer Engineering, or related field (or equivalent experience)
Nice to Have
Experience with malware analysis, IOC/APT analysis, and signature development (YARA, SNORT)
Experience with exploit development or vulnerability research
Experience developing software for embedded systems or firmware analysis
Experience automating reverse engineering tasks or workflows
Familiarity with CNO environments, tools, or methodologies
Experience with packet analysis, traffic inspection, or network-based analysis
Exposure to version control or collaborative development environments
Break it down. Build the insight.
Apply now to learn more about our extensive benefits and customizable compensation packages.
#J-18808-Ljbffr
Can't: Join us as a Reverse Engineer!
At Adaptic, reverse engineers dive beneath the surface—analyzing software, uncovering vulnerabilities, and understanding systems at their core. Supporting the DoD and Intelligence Community, you'll help expose how technologies work, where they break, and how they can be leveraged to support mission needs.
Whether you're early in your career or leading advanced analysis efforts, we're looking for Reverse Engineers at all levels who are curious, analytical, and driven to solve complex technical challenges.
Your Impact
You’ll work across software and systems to analyze, deconstruct, and understand technologies at a fundamental level. Day-to-day, that can look like:
Performing reverse engineering and debugging on software, binaries, and system components
Identifying software defects, vulnerabilities, and potential exploitation paths
Researching open-source and emerging vulnerabilities to assess system risk
Developing methods and techniques to determine if running software is vulnerable
Analyzing malicious binaries, malware, and adversary techniques
Supporting identification of risks and providing mitigation strategies
Working with low-level code, including assembly and compiled languages
Leveraging industry-standard reverse engineering tools (e.g., Ghidra, IDA Pro, debuggers)
Analyzing system behavior across operating systems, memory, and processes
Supporting development of proof-of-concept code, scripts, or analysis artifacts
Automating reverse engineering and analysis workflows where possible
Collaborating with cross-functional teams to support mission objectives
Qualifications
All positions require an active TS/SCI with polygraph
Experience with low-level programming and assembly language
Proficiency in C, C++, Python, or similar languages
Experience using reverse engineering tools and techniques
Strong understanding of system internals (operating systems, memory, binaries)
Experience analyzing complex or malicious code and identifying vulnerabilities
Familiarity with networking concepts and how systems communicate
Ability to problem-solve in complex, mission-driven environments
A degree in Computer Science, Computer Engineering, or related field (or equivalent experience)
Nice to Have
Experience with malware analysis, IOC/APT analysis, and signature development (YARA, SNORT)
Experience with exploit development or vulnerability research
Experience developing software for embedded systems or firmware analysis
Experience automating reverse engineering tasks or workflows
Familiarity with CNO environments, tools, or methodologies
Experience with packet analysis, traffic inspection, or network-based analysis
Exposure to version control or collaborative development environments
Break it down. Build the insight.
Apply now to learn more about our extensive benefits and customizable compensation packages.
#J-18808-Ljbffr