STR is looking for an Associate Software Reverse Engineer to research and analyze vulnerabilities in cyber-physical systems, contributing to national security.
Requirements
- Experience with binary analysis of software/firmware
- Experience with disassembly tools, such as IDA Pro, Binary Ninja, or Ghidra
- Proficiency in one or more programming languages: C/C++, Python, etc.
- Proficiency in one or more Assembly Languages: x86, ARM, etc.
- General understanding of reverse engineering fundamentals: memory layout, calling conventions, etc.
- Vulnerability research and analysis
- Knowledge of weaponizing discovered vulnerabilities into exploits
Responsibilities
- Reverse engineering complex software or firmware targets, ranging from typical Windows/Linux binaries to embedded firmware running non-traditional computer architectures and operating systems
- Developing and applying automated reverse engineering and binary analysis tools to characterize protocols, interfaces, and functionality of target systems
- Developing innovative cybersecurity solutions
- Working in multi-discipline teams to tackle challenging problems from a wide variety of technologies to develop innovative cybersecurity solutions
- Performing vulnerability weaponization, exploit development, payload development, and exploit mitigation on a variety of challenging targets
- Documenting, demonstrating, and presenting research
- Solving real world problems that have an impact on national security
Other
- This position requires an Active Top Secret (TS) security clearance* , for which U.S. citizenship is needed by the U.S. Government
- Work must be performed onsite.
- BS, MS or PhD in Computer Science, Computer Engineering, Cybersecurity or related field (or equivalent work experience)
- Implant or software patch development
- Experience with DSP architectures, such as Texas Instruments, STMicroelectronics, NXP, or Analog Devices.