Mediabistro logo
job logo

Reverse Engineer All Levels

Adaptic, Corridor North, MD, United States


Break What Others

Can't: Join us as a Reverse Engineer!

At Adaptic, reverse engineers dive beneath the surface—analyzing software, uncovering vulnerabilities, and understanding systems at their core. Supporting the DoD and Intelligence Community, you'll help expose how technologies work, where they break, and how they can be leveraged to support mission needs.

Whether you're early in your career or leading advanced analysis efforts, we're looking for Reverse Engineers at all levels who are curious, analytical, and driven to solve complex technical challenges.

Your Impact
You’ll work across software and systems to analyze, deconstruct, and understand technologies at a fundamental level. Day-to-day, that can look like:

Performing reverse engineering and debugging on software, binaries, and system components

Identifying software defects, vulnerabilities, and potential exploitation paths

Researching open-source and emerging vulnerabilities to assess system risk

Developing methods and techniques to determine if running software is vulnerable

Analyzing malicious binaries, malware, and adversary techniques

Supporting identification of risks and providing mitigation strategies

Working with low-level code, including assembly and compiled languages

Leveraging industry-standard reverse engineering tools (e.g., Ghidra, IDA Pro, debuggers)

Analyzing system behavior across operating systems, memory, and processes

Supporting development of proof-of-concept code, scripts, or analysis artifacts

Automating reverse engineering and analysis workflows where possible

Collaborating with cross-functional teams to support mission objectives

Qualifications

All positions require an active TS/SCI with polygraph

Experience with low-level programming and assembly language

Proficiency in C, C++, Python, or similar languages

Experience using reverse engineering tools and techniques

Strong understanding of system internals (operating systems, memory, binaries)

Experience analyzing complex or malicious code and identifying vulnerabilities

Familiarity with networking concepts and how systems communicate

Ability to problem-solve in complex, mission-driven environments

A degree in Computer Science, Computer Engineering, or related field (or equivalent experience)

Nice to Have

Experience with malware analysis, IOC/APT analysis, and signature development (YARA, SNORT)

Experience with exploit development or vulnerability research

Experience developing software for embedded systems or firmware analysis

Experience automating reverse engineering tasks or workflows

Familiarity with CNO environments, tools, or methodologies

Experience with packet analysis, traffic inspection, or network-based analysis

Exposure to version control or collaborative development environments

Break it down. Build the insight.

Apply now to learn more about our extensive benefits and customizable compensation packages.

#J-18808-Ljbffr