STR is looking to solve the problem of research and analysis of vulnerabilities in cyber physical systems to develop innovative cybersecurity solutions and tackle challenging problems from a wide variety of technologies, ultimately having an impact on national security
Requirements
- Experience with binary analysis of software/firmware
- Experience with disassembly tools, such as IDA Pro, Binary Ninja, or Ghidra
- Proficiency in one or more programming languages: C/C++, Python, etc.
- Proficiency in one or more Assembly Languages: x86, ARM, etc.
- General understanding of reverse engineering fundamentals: memory layout, calling conventions, etc.
- Vulnerability research and analysis
- Knowledge of weaponizing discovered vulnerabilities into exploits
Responsibilities
- Reverse engineering complex software or firmware targets, ranging from typical Windows/Linux binaries to embedded firmware running non-traditional computer architectures and operating systems
- Developing and applying automated reverse engineering and binary analysis tools to characterize protocols, interfaces, and functionality of target systems
- Developing innovative cybersecurity solutions
- Working in multi-discipline teams to tackle challenging problems from a wide variety of technologies to develop innovative cybersecurity solutions
- Performing vulnerability weaponization, exploit development, payload development, and exploit mitigation on a variety of challenging targets
- Documenting, demonstrating, and presenting research
- Solving real world problems that have an impact on national security
Other
- Active Top Secret (TS) security clearance
- U.S. citizenship is needed by the U.S. Government
- BS, MS or PhD in Computer Science, Computer Engineering, Cybersecurity or related field (or equivalent work experience)
- Ability to work onsite
- Must be able to obtain national security clearances and satisfy the requirements for compliance with export control and other applicable laws