The company is looking to solve complex national security challenges through reverse engineering and vulnerability research.
Requirements
- Minimum 10 years of experience in firmware development using low-level programming languages (C and at least one assembly language), scripting languages (e.g., Python), and the *nix command line
- Minimum 8 years of experience with common disassemblers/decompilers and reverse engineering tools (IDA, Ghidra, Binary Ninja)
- Strong familiarity with cybersecurity principles
- Experience with software reverse engineering concepts: static analysis, dynamic analysis, fuzzing techniques
- Familiarity with building or securing embedded devices, other digital systems, and embedded binary reverse engineering (ARM, RTOS, etc.)
- Familiarity with basic cryptography design and implementation concepts
Responsibilities
- Collaborate with team to align capability development roadmaps and complete transfer of vulnerability research prototypes into production environments
- Perform reverse engineering and vulnerability analysis, informing operational parameters for complex systems
- Conduct in-depth reverse engineering and vulnerability analysis across various architectures and platforms
- Model and analyze in-memory compiled application behavior to answer customer requirements
- Assist with the forward development of technical solutions
- Train & mentor junior engineers
Other
- Bachelor’s (or higher) degree in computer science, engineering, or a related field
- Active US Security clearance of Top Secret level and ability to obtain and maintain SCI
- Must be willing to obtain and maintain a Polygraph clearance
- Previous experience in a client-facing technical role