Draper is looking for individuals to develop tailored solutions to meet DoD and IC Sponsor directives, addressing national challenges through cyber security expertise.
Requirements
- Proficiency with static and dynamic analysis techniques for forensic analysis and anomaly detection
- Proficiency in techniques that prevent reverse engineering and employ obfuscation or diversification.
- Experience conducting in-depth technical threat analysis and research
- Hands-on proficiency with forensic analysis tools such as: FTK Imager, X-Ways, Autopsy, Volatility
- Proficiency with modern program analysis methodologies and techniques
- Reverse-engineering assessment techniques for software, firmware and/or embedded systems
- Hands-on proficiency with reverse engineering tooling such as: Ghidra, IDA, GDB, RR
Responsibilities
- Assess hardware and software for security vulnerabilities using a breadth of technologies and techniques.
- Develop software that meets behavior and security requirements for tailored applications.
- Integrate software capabilities with other tasks or groups to improve performance or behavior requirements.
- Create new tools and systems to detect and exploit vulnerabilities and system weaknesses.
- Document nominal application and system functionality, in addition to implemented changes.
- Drive solutions to complex problems with limited direction – contribute to requirements. development, propose ways forward, and adapt appropriately to changes in requirements.
- Provides insight and suggest design modifications based on analysis outcomes, and to apply analysis techniques across a range of technical disciplines.
Other
- 5-10 years experience in Cybersecurity or related field is required.
- Actively mentor less experienced engineers and provide thoughtful, constructive feedback.
- Curiosity-driven approach to solving complex, customer-driven problems as part of a multi-disciplinary team.
- Collaborate and communicate effectively and openly with multi-disciplinary program team members, program leadership, and non-technical personnel.
- Applicants selected for this position must be required to obtain and maintain a government TS/SCI security clearance.