Malware Reverse Engineer Software Developer

Job Locations US-VA-Suffolk
Requisition ID
Position Category
Cyber Mission



The Naval Surface Warfare Center Dahlgren Division originally established itself as the major testing area for naval guns and ammunition. Today, it continues to provide the military with the development and integration of warfare systems for the warfighter, warfighting and the future fleet.



  • Peraton has an opportunity for an Malware Reverse Engineer Software Developer
  • The candidate serves as a top level expert and recognized authority in reverse engineering and malware development.
  • Conducts preliminary and advanced design studies and prepares and presents major portions of engineering proposals.
  • Conceives and develops solutions to complex analytical, design, and test problems that program(s) experience.
  • Contributes to systems philosophy and design objectives of highly complex systems.
  • Analyzes and resolves critical failures in test and service without the benefit theoretical studies.
  • Assures continuity of design features from advanced design through contract status.
  • Writes very complex specifications and engineering reports as a result of advance studies, special engineering investigations, and similar activities.
  • Develops aspects of new theory and design criteria for general application.


Specific job responsibilities include:


Development, testing, and sustainment of tools by:

  • Analyzing protocols and services vulnerabilities and recommend frameworks to exploit the vulnerabilities
  • Developing exploits based on proposed and US Government approved frameworks Testing tools in a representative environment, meeting all defined tool development lifecycle requirements
  • Sustaining tools when incorporated into the approved baseline


Exploit development to include:

  • Reverse engineering and debugger use
  • Malware development
  • Exploit development in: 

Kernels and (Windows/LINUX)  

  • Browsers/Webkit  Employ Cobalt Strike or other similar C2 Frameworks
  • Scripting or developing in one or more of the following: C# (.NET), C, C++, Python, Go, Rust, Assembly
  • Use Git or other versioning control software
  • Use containerization software (e.g. Docker) and other software virtual environments (e.g. PyEnv)
  • Leverage proof of concept code to build or tailor exploits, especially in the use of C2 tools
  • Use communication protocols such as DNS, http/s, websockets, or SMB
  • Employ EDR detection and evasion techniques
  • Provide verbose documentation on the applicability and use of each tool



Basic Requirements:

  • BS 12-15, MS 10-13. Phd 10+Bachelot's degree with 12 years of experience. Master's degree with 10 years of experience or PhD with 10+ years of experience
  • 8140.01 certification 641 (or similar) at the Intermediate Level
  • Demonstrated experience with Reverse Engineering
  • Demonstrated experience with API Development

  • Demonstrated experience developing Linux Tools

  • Demonstrated experience testing software in a testing environment

  • DevOps Experience: GitLab, GitLab CI, Docker Buildkit, docker-compose, cross-compilation toolchains, build systems

  • Active Secret Clearance

Peraton Overview

Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our employees do the can’t be done, solving the most daunting challenges facing our customers.

Target Salary Range

$190,000 - $304,000. This represents the typical salary range for this position based on experience and other factors.

EEO Tagline (Text Only)

An Equal Opportunity Employer including Disability/Veteran.


Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed