Digital forensics and malware reverse-engineering tools for defense and intelligence agencies
Cipher Tech Solutions builds production forensics and reverse-engineering software for DoD and Intelligence Community missions. The stack—C, C++, Assembly, IDA Pro, Ghidra, Binary Ninja, alongside embedded platforms (ARM, x86, VxWorks, FreeRTOS, Embedded Linux)—reflects deep systems-level work analyzing malware and extracting evidence from diverse hardware and media. Hiring skews mid-to-senior engineers (21 mid, 5 senior) in a 51–200-person org, consistent with specialized security engineering rather than scaling consumer product.
Founded in 2006 by Northeastern engineering students, Cipher Tech Solutions operates as a privately held software developer serving the U.S. Department of Defense and Intelligence Community. The company is structured around two core missions: digital forensics (extracting and processing evidence from computers, phones, embedded devices, and storage media to support federal law enforcement, counter-intelligence, and counter-terrorism) and malware reverse engineering (analyzing advanced malicious code to understand behavior and intent). Production tools are written by an engineering-heavy workforce. Current pain points include communication gaps in secure meeting environments, improving triage workflows, and addressing obfuscation techniques in malware samples.
Primary languages: C, C++, Assembly, Python, Bash. Analysis tools: IDA Pro, Ghidra, Binary Ninja, IDA. Embedded platforms: ARM, x86, VxWorks, QNX, FreeRTOS, Embedded Linux, Windows IoT. Cloud: AWS, Azure.
Digital forensics for law enforcement and counter-intelligence (evidence extraction from devices and media), and malware reverse engineering (analyzing advanced malicious code). Current focus includes integrating scripts into analysis pipelines and developing custom scripts for customer specifications.
Other companies in the same industry, closest in size