Reverse Engineer
Our client is currently seeking an aspiring Vulnerability Researcher/Reverse Engineer to work in their Chantilly, VA location.As a Vulnerability Researcher, you will work with disassemblers and debuggers to quickly understand how embedded devices operate. You will use and build tools that push past the edge of current tools and techniques. In a given day you will research and debug an embedded device while getting the chance to bounce ideas off of a close-knit team of researchers. We have the tools and the mentors you will need to take yourself to the next level and who are eager to learn from your experience.Key QualificationsBachelor’s degree in Computer Science, Computer Engineering, Electrical Engineering, or related field of study with 8 years of experience; Master’s degree in related field with 5 years of experience; PhD in a related field with 2 years of experience; or an equivalent combination of education and experienceDevelop software to run in user-mode or kernel-modeStrong understanding in reading assembly language and using debugging toolsExperience with a disassembler for vulnerability research (Ghidra, IDA Pro, BinaryNinja)Experience with one or more assembly languages (x86, x64, ARM, MIPS, PowerPC, etc.)Experience with one or more debuggers (WinDbg, OllyDbg, gdb)Experience with vulnerability research on one or more operating systems: Android, iOS, Windows, Linux, MacOS, VxWorks, QNX, RTOSs, or other custom operating systemsKnowledge of advanced exploitation techniques (ret2libc,use-after-free,type confusion)Knowledge of exploit protection techniques (DEP, ASLR/NX)Ability to code in CUnderstanding of network protocolsAbility to work individually and in small fast paced team environmentsPassion and drive to constantly need to improve your skill setMust Be a US Citizen with the ability and willingness to obtain a Secret or higher clearancePreferred QualificationsExperience using fuzzing tools such as AFL or PeachConcolic analysis research and implementationExperience emulating embedded platforms for live debuggingExperience with microcontrollersExperience with symbolic analysisActive Secret security clearance or ability to obtain one