Job Number: R0091783
Software Vulnerability Researcher, Lead
Are you looking for an opportunity to work in an R&D lab researching and analyzing security vulnerabilities associated with a wide variety of architectures for the Army? You possess an expert command of C/C++ programming, with knowledge of assembly language in one or more Instruction Set Architectures (ISA) and hardware platforms. You have demonstrated experience with reverse engineering tools, including Ida Pro, the use of fuzzing techniques and tools, and comprehend dynamic, concrete, symbolic, and concolic software analysis are essential.
As a Software Vulnerability Researcher on our team, you'll learn how to help customers overcome their most difficult challenges with a wide variety of architectures, including x86, MIPS, and ARM with an emphasis on embedded software applications and Real Time OS (RTOS). You'll also have the opportunity to use open source frameworks and reverse engineering tools like Ida Pro. You'll directly impact the DoD by conducting in depth assessments to find zero day vulnerabilities. With mentoring, positive reviews, and opportunities to learn new tools and skills, we focus on growing as a team to make the best solutions for our customers. The successful candidate will assume the lead research role in discovering vulnerabilities within identified applications in support of a research team. They will collaborate in identifying software patches and in the analysis for potential exploits which could have resulted from discovered vulnerabilities. Join us as we build systems to change the Army for the better.
Empower change with us.
-Experience with software reverse engineering tools and methods, including Ida Pro
-Experience with using fuzzing techniques and tools
-Experience with C/C++
-Experience with debuggers, compilers, assemblers, linkers, source code extractors, and disassemblers for Windows, Linux, Android, Apple OS X, and IOS platforms
-Experience with emulation, including QEMU or code intermediate representation (IR)
-Knowledge of dynamic, concrete, symbolic, and concolic software analysis
-Knowledge of assembly languages
-BA or BS degree in Computer Engineer, Computer Science, or Electrical Engineering
Nice If You Have:
-Experience with cyber
-Experience with Electronic Warfare
-Knowledge of IP Protocols
-MA or MS degree preferred; PhD a plus
Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; TS/SCI clearance is required.
We're an EOE that empowers our people—no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, veteran status, or other protected characteristic—to fearlessly drive change.#LI-AH1
Apply on company website