About the job
T-Rex Solutions is seeking a skilled CNO Software Developer to join our team in the Fort Meade area, supporting critical initiatives for the Intelligence Community.
Key Responsibilities:
This is an On-site Position.
As a CNO Developer at T-Rex Solutions, you will analyze systems to gain insights into their functionality and identify potential failures. You will be tasked with developing innovative solutions while also counteracting advanced security measures. Your day-to-day tasks may include disassembling systems, auditing code in Python, or collaborating in small teams closely aligned with customer needs. Opportunities to lead teams of developers and researchers may also be available.
Qualifications:
Typically requires a Bachelor’s degree in a related field, accompanied by four (4) years of relevant experience or a minimum of eight (8) years of experience in the field.
Proficiency in programming languages such as Assembly, C, C++, Java, Perl, or Python is essential.
An active and transferable U. S. government-issued TS/SCI with polygraph security clearance is mandatory prior to your start date.
U. S. citizenship is required, as only U. S. citizens are eligible for a security clearance.
Desired Skills: Candidates should possess three or more of the following skills:
• Understanding of OS Internals (e.g., Windows)
• Experience in Vulnerability Research
• Proficiency in reading or writing assembly (x86, x64, ARM, PPC, MIPS, SPARC, or others)
• Experience in developing embedded systems
• Familiarity with network protocols (TCP/IP stacks, wire-level protocols, RF communications, BGP, routing protocols, etc.)
• Knowledge of exploit mitigations such as DEP and ASLR
• Experience with reverse engineering tools such as IDA Pro, HexRays, Ghidra, Binary Ninja, or objdump
• Proficiency with debuggers like gdb, WinDbg, OllyDbg
• Familiarity with BDI/JTAG
• Knowledge of modern C++ development practices, including RAII, C++11, and C++14
• Experience in building and utilizing tools to identify, exploit, and productize vulnerabilities in complex software systems.
