Reverse Engineer Resume Samples

4.9 (92 votes) for Reverse Engineer Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the reverse engineer job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
DO
D Okuneva
Dion
Okuneva
29438 Ondricka Circle
Phoenix
AZ
+1 (555) 494 8953
29438 Ondricka Circle
Phoenix
AZ
Phone
p +1 (555) 494 8953
Experience Experience
Chicago, IL
Reverse Engineer
Chicago, IL
Smith-Marvin
Chicago, IL
Reverse Engineer
  • Research into advances in online threats from the underground economy and assist with developing solutions to prevent and investigate targeted attacks
  • Performing independent research to better understand complex technical problems
  • Provide support to Fraud investigations where use of complex technology has been instrumental in the commission of the fraud
  • Analyze network traffic and protocols
  • Analysis of binary files to uncover potential threats and quickly develop prototype demonstrations of the risk
  • Performs systems modeling, simulation, and analysis
  • Develop of processes and techniques for analysis of malware and detection of direct threats to the Firm
Philadelphia, PA
Senior Malware Reverse Engineer
Philadelphia, PA
Schroeder Inc
Philadelphia, PA
Senior Malware Reverse Engineer
  • Develop and support malware analysis tools and platforms
  • Research newly software vulnerabilities and develop exploits and detection algorithms
  • Analyze or reverse-engineer malware using static and dynamic techniques
  • Train and mentor junior team members on malware analysis and reversing
  • Produce reports detailing malware attributes, functionality, and indicators
  • Research threat actors and maintain knowledge of threat landscape
  • Expert knowledge of dynamic and static analysis
present
Boston, MA
Lead Services Gearbox Reverse Engineer
Boston, MA
Reilly Group
present
Boston, MA
Lead Services Gearbox Reverse Engineer
present
  • Perform design/analysis of Rotating Parts including sub-systems and develop detailed documentation
  • Provide timely communications on significant issues or developments
  • Working knowledge of 3D-CAD tools like UG
  • Assure proper documentation of technical data generated for the assigned projects and/or tasks consistent with engineering policies and procedures
  • Upload Drawings and Specification in GE systems to have them ready and activated in Oracle for Global Sourcing team to buy them
  • Development of services gearbox remanufacturing specifications, drawings and reviews in coordination with internal teams or external 3rd engineering parties
  • Participate as a presenter or reviewer in technical and program reviews
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Brigham Young University
Bachelor’s Degree in Computer Science
Skills Skills
  • Able to work either independently or in a team to conduct reverse engineering
  • The ability to coordinate, work with, and gain the trust of business stakeholders to achieve a desired objective
  • Able to articulate and visually present analysis results
  • Able to work under pressure in time critical situations
  • Strong attention to detail in conducting malware analysis combined with an ability to accurately record full documentation in support of the investigation
  • Detailed knowledge of current international best practices in the high tech investigation and forensics arena
  • Ability to communicate effectively with business representatives in explaining analysis findings clearly and where necessary, in layman’s terms
  • Ability to communicate with other industry professionals to ensure solid partnerships with key external stakeholders to ensure that the analysis process remains at a word class level
  • Industry standard information security technology certifications (GCIH, GREM, GSEC, etc) are
  • Identifying and analyzing software exploits and raw x86 shellcode
Create a Resume in Minutes

15 Reverse Engineer resume templates

1

Reverse Engineer Resume Examples & Samples

  • Demonstrating a deep understanding of high-tech investigation skills, techniques and tools necessary for conducting live forensics on critical systems, and being able to produce detailed analysis of the root cause of any incidents
  • Conducting reverse engineering on malware and other suspicious code, and producing a detailed report of the findings
  • Bachelors Degree in Computer Science or other Technology related fields preferred
  • Masters Degree in Engineering, Computer Science or other Technology related fields a major plus
  • Prefer 7+ years experience working in cybercrime investigation, malware reverse engineering and other related fields with a combination of both public and private sector experience preferred
  • A proven track record in malware reverse engineering, mobile malware, memory forensics and network forensics
  • Ability to analyze assembly-level code on multiple platforms (x86, x64, ARM, etc)
  • Ability to reverse both user-mode and kernel-mode software Ability to create Indicators of Compromise (IOCs) as an output of reverse engineering efforts
  • Ability to create and analyze network protocols throughout all layers of the network stack
  • Ability to automate tasks using a scripting language (Python, Perl, Ruby, etc)
  • Experience with investigating large data compromise events, working with consultants to mitigate risk to data compromise and investigating insider threats incidents
  • Knowledge of reverse engineering best practices and industry standard methodologies
  • Knowledge of the financial industry and topical threats which provide challenges to the data security within the financial sector
  • Demonstrated experience automating malware analysis (sample acquisition, identification, automated dynamic analysis, etc.)
  • Familiarity with common cryptography algorithms
  • Broad knowledge in a variety of programming languages (C/C++, Java, x86 Assembly, JavaScript, etc.)
  • Experience defeating anti-reversing tools and techniques (packers, obfuscation, encryption, etc.)
  • Familiarity with standard software used in reverse engineering (IDA, WinDbg, VMWare, etc.)
  • Able to work either independently or in a team to conduct reverse engineering
  • The ability to coordinate, work with, and gain the trust of business stakeholders to achieve a desired objective
  • Strong attention to detail in conducting malware analysis combined with an ability to accurately record full documentation in support of the investigation
  • Detailed knowledge of current international best practices in the high tech investigation and forensics arena
  • Ability to communicate effectively with business representatives in explaining analysis findings clearly and where necessary, in layman’s terms
  • Ability to communicate with other industry professionals to ensure solid partnerships with key external stakeholders to ensure that the analysis process remains at a word class level
2

Malware Reverse Engineer Resume Examples & Samples

  • Collect, analyze and report on malicious code such as malware, spam and/or phishing emails targeting Citi internal assets and Citi customers to understand the malware attack capabilities and understand its propagation and exploitation characteristics
  • Analyze HTTP session data and identify characteristics that can be used to identify compromised sessions
  • Work with CIC partners and anti-virus experts to define signatures for detecting the malware
  • Work with Citi’s Security Incident Response Team (SIRT) to respond to incidents that involve malware
  • Interact and collaborate with CIC partners to further malware research and analysis
  • Support the development and documentation of a Malicious Code Research Analysis process
  • A Bachelor’s degree in a computing-related course of study with high academic performance within the core subject area of study (3.0 on a 4.0 scale and above), or a suitable combination of education and experience
  • 5+ years Malware Reverse Engineering experience
  • Knowledge of malicious code intent, infection vectors, and malware operation
  • Familiarity with state-of-the-art malware detection evasion techniques
  • Experience with malware research tools such as debuggers, hex editors, unpackers, virtual machines, network sniffers / packet capture tools
  • Strong technical writing skills (English) and ability to communicate effectively to both technical and general user audiences
  • Strong interpersonal skills and team-player attitude
  • Critical thinking and troubleshooting skills with a focus upon analytical capabilities
  • Experience with scripting and programming languages, including but not limited to Python, Perl, and C, C++
  • Ability to unpack, analyze and understand obfuscated executable binaries
  • Experience with network protocols, packet capture tools, and the ability to detect malicious executable and other artifacts within PCAP files
  • Knowledge of commonly compromised file formats, for example, PDF. Ability to analyze (both dynamically and statically) malicious code in a safe environment and fully document its actions
3

Malware Reverse Engineer Resume Examples & Samples

  • 5+ years of experience with application security, network security, reverse engineering, or malware
  • Knowledge of Windows internals and the Win32 API
  • Ability to be self-motivated and acquire new expertise
  • Experience with program and system analyses with various tools, including IDA Pro, OllyDbg, PCAP tools, or TCP Dump
  • Experience with Assembly programming
  • Experience with Web programming
  • Knowledge of worms, viruses, Trojans, rootkits, and botnets
  • BA or BS degree in CS or Computer Engineering
4

Reverse Engineer Resume Examples & Samples

  • 3+ years of experience with performing reverse engineering and vulnerability analysis of software binaries using IDA Pro or similar software
  • 3+ years of experience with performing dynamic analysis of software binaries using OllyDbg, WINDbg, or similar software
  • 3+ years of experience with reading or writing at least one assembly language, including x86, ARM, MIPS, or PowerPC
  • 3+ years of experience with performing bit-level data analysis
  • 3+ years of experience with performing protocol analysis using Wireshark or similar software
  • 3+ years of experience with performing tools in a scripting language, including Python, Perl, Ruby, or similar language
  • 3+ years of experience with developing software systems in Assembly, C, C++, or other low-level proprietary languages in one or more of the following operating systems: UNIX, Linux, VxWorks, or vendor-proprietary operating systems
  • BA or BS degree in CS, Engineering, or a related field preferred
5

CNO Reverse Engineer Resume Examples & Samples

  • Detailed understanding of how software vulnerabilities function in Windows, Linux, OS X, and web applications
  • Strong knowledge of x86/x86_64 assembly language
  • Expert in C programming
  • Fluent in use of debuggers to perform assembly level debugging of user space software
  • Strong knowledge of low level, systems programming concepts
  • Experience developing software using C in Windows environment with Win32 or Native API
  • Experience developing software using C in POSIX environments (Linux, OS X) or ability to learn as needed
  • Experience using source code version control systems such as Subversion or Git
  • Strong understanding of how software security technologies such as ASLR, DEP, and SEHOP operate
  • Experience using disassemblers such as IDA Pro
  • Knowledge of operating system internals (Windows, Linux, OS X)
  • Experience with kernel development/debugging
  • Experience using Python and XML
6

Reverse Engineer Resume Examples & Samples

  • Identifying and analyzing software exploits and raw x86 shellcode
  • Analyze network traffic and protocols
  • Using a high-level scripting/programming language to extract, de-obfuscate, or otherwise manipulate malware related data
  • Debugging both user-mode and kernel-mode software
  • Navigate within a LINUX system as a user to include running scripts and reviewing data
  • Providing mitigation suggestions in the context of a security incident, as it relates to the technical analysis of malware or other attack artifacts
  • Performing independent research to better understand complex technical problems
  • Bachelor of Science Degree in Computer Science, Electrical Engineering, Computer Engineering, Physics or similar technical major and seven (7) years of software engineering experience. In lieu of Bachelor Degree, a minimum of fourteen (14) years of software engineering experience is required
  • Minimum of seven (7) years combined experience in the following programming, scripting and query languages
7

Malware Reverse Engineer Resume Examples & Samples

  • Must have active TS/SCI with Poly**
  • IDA Pro (tool for reverse engineering malware)
  • OllyDdg (tool for debugging malware)
  • REMnux (software for reverse engineering malware)
  • EnCase (forensic analysis tool)
  • Malware Analysis
  • 80386 Assembly Language Programming
  • Linux Assembly Language Programming
  • Reverse Engineering/Disassembly
  • Intrusion analysis
  • Forensic analysis
  • Behavioral, dynamic, and static analysis of malware
  • Building and configuring malware analysis labs
  • Network incident response
  • Forensics analysis of hard drives, systems, and networks
  • Threat intelligence analysis
8

Lead Reverse Engineer Resume Examples & Samples

  • Given a target communications device, use reverse engineering tools and methods to determine vulnerabilities of the device for information assurance purposes
  • Initial steps will include studying how the device operates, configuring it, determining how it boots/initializes, and obtaining a binary that can be used for reverse engineering
  • Goals for the reverse engineering effort will include: identifying the function that respond to network connections requests, understanding internal communications mechanisms, outlining the general structure of the system software, and determining how system state is altered/saved
  • On conclusion, project deliverables will be a report and presentation summarizing what was learned
  • MS degree in computer science, electrical engineering, or related field
9

Senior Reverse Engineer Resume Examples & Samples

  • Reverse engineer software for security mechanism bypass
  • Develop computer code in multiple languages as applicable
  • Develop instrumentation in support of primary tasks
  • Follow Agile Scrum methodology
  • Take self initiative to remain knowledgeable of evolving trends in offensive and defensive cyber tools, tactics, and procedures
  • Perform as a team member in the research of software vulnerabilities
  • Perform as a team lead on projects when suitable
10

Lead Services Gearbox Reverse Engineer Resume Examples & Samples

  • Development of services gearbox remanufacturing specifications, drawings and reviews in coordination with internal teams or external 3rd engineering parties
  • Design / analysis documentation, e.g. Specifications, Design Practices, BoM, Work Desk Instructions (WDI), etc
  • Upload Drawings and Specification in GE systems to have them ready and activated in Oracle for Global Sourcing team to buy them
  • Supporting site failure analysis and correction, supplier qualification/deviation disposition and GE manufacturing on all technical issues related to Gearbox and rotating machinery
  • Perform design/analysis of Rotating Parts including sub-systems and develop detailed documentation
  • Execute the design, analysis, or evaluation of assigned projects using sound engineering principles and adhering to business standards, practices, procedures, and product/program requirements
  • Suport Global Supply Chain on parts qualification
  • BS or MS in Mechanical Engineering or any other suitable Engineering qualification
  • Significant experience in an gearbox engineering position
  • Some experience in a Wind engineering position
  • Experience in design & analysis of rotating parts components
11

Malware Reverse Engineer Resume Examples & Samples

  • Ability to reverse engineer binaries of various types including: x86, x64, C, C++, .NET, and Delphi
  • Understanding of x86, ARM, and x64 architectures
  • Capable of Python scripting to automate analysis and reverse engineering tasks
  • Strong knowledge of tools used for malware analysis such as debuggers and disassemblers
  • Strong understanding of Windows Operating System Internals and Windows APIs
  • Ability to analyze shellcode; packed and obfuscated code and the associated algorithms
  • Understanding of common attacker methodologies and exploit techniques
  • Understanding of network protocols and networking concepts
  • Strong initiative, problem solving and critical thinking skills
  • Demonstrated ability to work collaboratively as part of a team
  • Active Top Secret clearance with eligibility for SCI
  • Experience with Windows system programming, driver development and/or IDAPython
  • Understanding of software engineering methodologies
  • Familiarization with Linux OS
  • Mobile IOS/Android experience
  • Experience with DShell
12

Reverse Engineer Resume Examples & Samples

  • 7 years of experience in the following programming, scripting, and query languages: C, C++, Assembly, including Intel, Motorola, and PowerPC, Java, Pen, Python, C Shell, Bash, and SQL
  • Experience with performing reverse engineering and vulnerability analysis of software binaries using IDA Pro or similar software
  • Experience with performing dynamic analysis of software binaries using OllyDbg, WINDbg, or similar software
  • Experience with performing protocol analysis using Wireshark or similar software
  • BS degree in CS, EE, Computer Engineering, or Physics and 7 years of experience with software engineering or 14+ years of experience with software engineering in lieu of a degree
13

Reverse Engineer Resume Examples & Samples

  • Perform hardware and software reverse engineering research on a variety of platforms
  • Work independently in a research environment with few requirements and formal structure
  • Self-Directed and Motivated
  • FPGA development experience
  • Experience working in a “hacker”-style, flat, self-starter office culture
  • Possesses a Vulnerability Researcher / Penetration Test Mentality
  • Experience in reverse engineering
14

Reverse Engineer Resume Examples & Samples

  • Analysis of binary files to uncover potential threats and quickly develop prototype demonstrations of the risk
  • Projects will be undertaken as small teams in close coordination with customers to quickly analyze executables and data-files and prepare proof of findings in assembly, C, Java, and scripting languages
  • Improving code execution capabilities of existing vulnerabilities, using static and dynamic analysis techniques
  • Circumventing software security protection methods and techniques
  • Reverse engineering complex systems and protocols
  • Creating detailed technical reports to document findings along with proof-of-concept code
  • 8+ years of combined technical engineering experience in a security engineering, information assurance, information security operations, or cyber security operations role
  • 3+ years of experience working with debuggers and disassemblers
  • 3+ years developing code in PowerPC, MIPS, or ARM assembly
  • 3+ years developing code in C for Windows and Linux
  • Experience debugging embedded systems
  • Strong understanding of wired and wireless networking protocols
  • Experience with threat analysis & detection tools and techniques as well as disassembly tools
  • Existing Secret clearance, with the ability to obtain TS/SCI
  • Experience with malware analysis
  • Experience with vulnerability analysis
  • Experience with cryptographic systems
  • Experience developing code for mobile platforms
  • Experience with network mapping
  • Experience with SCADA HMI
  • Familiarity working in virtualized and sandbox environments
  • Familiarity with IDA pro and Oly Dbg
  • Existing TS/SCI Clearance desired
  • 8 Years, with a B.S./B.A. in Engineering, Science, or Mathematics, or 6 years with MS/MA in Engineering, Science or Mathematics, or 4 years with PhD in Engineering, Science or Mathematic
15

Reverse Engineer Resume Examples & Samples

  • 3 years of experience with software engineering
  • Experience with working in virtualized environments, analyzing malware, and developing CNO software
  • Experience with developing software systems in assembly, C, C++, or other low–level proprietary languages on UNIX, Linus, VxWorks, or vendor–proprietary operating systems
  • Ability to read or write at least one assembly language, including x86, ARM, MIPS, or PowerPC
  • BS degree or 7 years of experience with software engineering in lieu of a degree
16

Reverse Engineer Resume Examples & Samples

  • Experience with computer forensics or working with computer forensic analysts
  • Experience working as a developer with Python, C or C++, or other languages
  • Knowledge of reverse engineering for other operating systems
  • Reverse engineering of code embedded in documents
17

Reverse Engineer Resume Examples & Samples

  • A Bachelor’s Degree from an accredited college or university in Computer Science, Computer Security, Information Systems or related discipline and ten (10) years of relevant professional experience and training commensurate with Computer Science, Computer Security and/or Information Systems curriculums
  • 10+ years of experience with research in at least one of the following: Cyber security, reverse engineering, vulnerability research, or exploit development
  • Experience with various network security tools
  • Knowledge of Windows, UNIX or Linux-based operating systems
  • Ability to analyze all-source intelligence material and develop new tactics, techniques, and procedures to meet strategic and operational needs
  • Ability to work with people at all levels
  • *All candidates must be US Citizens to be considered for the position.***
18

Reverse Engineer Resume Examples & Samples

  • 7 years of experience with programming, scripting, and query languages, including C, C++, Assembly, such as Intel, Motorola, and PowerPC, Java, Pen, Python, C Shell, Bash, and SQL
  • Experience with performing reverse engineering and vulnerability analysis of software binaries using IDA Pro or equivalent software
  • Experience with performing dynamic analysis of software binaries using OllyDbg, WINDbg, or equivalent software
  • Experience with performing protocol analysis using Wireshark or equivalent software
19

Reverse Engineer Resume Examples & Samples

  • Windows and/or Linux device drivers
  • Kernel debugging
  • Boot procedures
20

Reverse Engineer Resume Examples & Samples

  • Experience with developing software systems in assembly, C, C++, or other low-level proprietary languages on Windows, Unix, Linux, VxWorks, or vendor-proprietary operating systems
  • BA or BS degree with 3+ years of experience in software engineering or reverse engineering, or 7+ years of experience in software engineering of reverse engineering in lieu of a degree
  • Experience with working in virtualized environments
  • Experience with kernel-level development
  • Knowledge of IA concepts, including cryptography
  • BS degree in CS, EE, Computer Engineering, Physics, or a similar technical field preferred
21

Reverse Engineer, Mid Resume Examples & Samples

  • Experience with programming, including Python, C, C++, and Assembly
  • Experience with performing reverse engineering and vulnerability analysis of software binaries using IDA Pro or similar software and performing dynamic analysis of software binaries using OllyDbg, WINDbg, or similar software
  • Experience with developing software systems in assembly, C, C++, or other low-level proprietary languages on Windows, UNIX, Linux, VxWorks, or vendor-proprietary operating systems
  • Experience with analyzing malware
  • Experience with reverse engineering x86 Windows binaries
  • Experience with reverse engineering embedded firmware
  • Experience with developing CNO software
  • Experience with Windows or Linux driver development
22

Reverse Engineer Resume Examples & Samples

  • 5+ years of experience with developing hardware and software systems in Assembly, C, C++, or other low-level proprietary languages on UNIX, Linux, VxWorks, or vendor proprietary operating systems
  • Experience with Linux operating systems and related software development environments
  • Experience with scripting languages to perform post processing analysis
  • Knowledge of IDA Pro, Python, Confluence, Jira, or GIT
  • Knowledge of hardware reverse engineering techniques, Assembly, including MIPS, PowerPC, ARM, and x86, Linux, and Agile workflow
  • BS degree in EE, Computer Engineering, Software Engineering, or CS
  • Knowledge of OSI model and networking protocols
23

Malware Reverse Engineer Resume Examples & Samples

  • Experience developing in Python, C, C++, and/or C#
  • Understanding of the PE file format and experience parsing structured or unstructured data
  • Top Secret clearance required, TS/SCI highly desired
  • Familiarization with VMWare Workstation, Network, and SysInternal tools
  • Code reverse engineering or malware analysis skills
  • Experience with static analysis of malware
  • Experience with Sandboxes
24

Senior Reverse Engineer Resume Examples & Samples

  • S. or M.S. in Computer Science, Computer Engineering, or related discipline
  • 5+ years' experience required
  • Deep knowledge of computer science, computer security, and embedded systems
  • Strong knowledge of C, C++ and x86 and/or ARM assembly
  • Background in vulnerability analysis and exploitation
  • Development and vulnerability research experience on Windows, Linux, OSX and embedded systems
  • Dynamic and static reverse-engineering skills
  • Experienced with WinDBG, GDB, LLDB or IDA
25

Reverse Engineer Resume Examples & Samples

  • 5+ years of experience in a Cybersecurity role, including Cyber threat analyst, malware analyst, or forensic examiner
  • Experience with using both Windows and UNIX operating systems
  • Experience with performing reverse engineering and vulnerability analysis of software binaries using IDA Pro or equivalent software and performing dynamic analysis of software binaries using OllyDbg, WINDbg, or equivalent software
  • Knowledge of basic internet protocols, including TCP/IP
  • Ability to read or write in one or more assembly languages, including x86, ARM, MIPS, or PowerPC
  • Ability to identify Cyber threat tactics, techniques, and procedures (TTPs) and attribution
  • Ability to perform static and dynamic malware analysis
  • Ability to think and work independently with minimal supervision
  • Experience with writing or developing SNORT signatures
  • Active Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), GIAC Certified Incident Handler (GCIH), GIAC Security Essentials (GSEC), GIAC Reverse Engineering Malware (GREM), GIAC Certified Forensic Examiner (GCFE), or GIAC Certified Forensic Analyst (GCFA) Certification
26

Senior Malware Reverse Engineer Resume Examples & Samples

  • Analyze or reverse-engineer malware using static and dynamic techniques
  • Research newly software vulnerabilities and develop exploits and detection algorithms
  • Produce reports detailing malware attributes, functionality, and indicators
  • Develop and support malware analysis tools and platforms
  • Train and mentor junior team members on malware analysis and reversing
  • Research threat actors and maintain knowledge of threat landscape
  • Develop and communicate an understanding of emerging threats, tactics, and techniques
  • Experience analyzing common types of attacks
  • Log analysis and experience reviewing security events
  • Knowledge of intrusion analysis, network and host forensics
  • 3-5 years of experience with Python and other scripting languages
  • Experience with virtualization and Linux containers
  • Knowledge of information security threat types, their composition, and IOCs
  • Knowledge of attacker tactics, techniques, and procedures (TTPs)