The company is looking to solve complex cybersecurity challenges by uncovering vulnerabilities in wireless and embedded systems.
Requirements
- Experience developing, debugging, and scripting in C/C++ and Python within Linux command-line environments, with a strong emphasis on low-level programming, memory management, and system interaction for reverse engineering and vulnerability research.
- Experience with reverse engineering and vulnerability research, using tools such as IDA Pro, Binary Ninja, or Ghidra.
- Expertise in one or more of the following: Firmware analysis (ARM, MIPS, PowerPC, RTOS), Firmware rehosting using emulation tools such as QEMU, Fuzzing and exploit development, Binary obfuscation and anti-analysis techniques, Wireless protocols and radio signal analysis, File system forensics and fault injection frameworks.
- Experience in embedded development using C/C++ for RTOS or Linux environments (preferred).
- Knowledge of cryptographic security and secure boot mechanisms (preferred).
- Hands-on experience working with hardware debugging tools, JTAG/SWD, or software-defined radio (SDR) frameworks (preferred).
Responsibilities
- Perform high throughput reverse engineering against network devices and other embedded systems, identifying vulnerabilities and assessing their security impact.
- Develop proof-of-concept exploits for discovered vulnerabilities following DevOps best practices for keeping code bases organized and maintainable.
- Analyze firmware, software protections, and protocols to uncover security flaws.
- Utilize and develop custom tools to analyze software/firmware binaries.
- Solve complex technical challenges with no predefined solutions.
Other
- Bachelor's (or higher) degree in Computer Science, Computer/Electrical Engineering, or a related field (or equivalent practical experience).
- Active Top Secret clearance required with eligibility/willingness to obtain a TS/SCI.
- Client-facing experience in technical roles (preferred).