2026 Graduate - Reverse Engineer - Offensive Cyber Capabilities

Johns Hopkins Applied Physics LaboratoryLaurel, MD
5h

About The Position

Do you have an insatiable curiosity to understand how things work? Are you a creative engineer who loves to imagine new solutions to complex problems? Do you want the chance to solve some our nation’s hardest cyber challenges? If so, we want you to join our team at APL! Our team of world-class reverse engineers is growing! We are looking for motivated and enthusiastic engineers who want to learn, want to collaborate, and love to hack anything. Our team specializes in software and hardware reverse engineering, vulnerability research, and developing proof-of-concept offensive cyber capabilities with a focus on embedded systems. We have custom facilities tailored to specific classes of systems including vehicles, telecommunications/network infrastructure, and industrial systems as well as general reverse engineering labs. As a member of our group you will... Be mentored by top experts to learn the art and science of reverse engineering Perform deep investigations of software, firmware, and hardware Develop exploits against embedded systems Build mission-aligned capabilities Propose new ideas for internal and external funding opportunities Share knowledge by clearly articulating ideas through papers and presentations to team members, APL management, and government decision makers.

Requirements

  • Are graduating with a Bachelor’s or Master's degree in Computer Engineering, Computer Science, Electrical Engineering, or a related field
  • Have an excellent academic record with demonstrated knowledge of fundamental topics such as computer architecture, operating systems, and data structures
  • Are proficient with one or more programming languages
  • Have experience using debuggers and reverse engineering tools such as Ghidra, IDA, and Binary Ninja
  • Love solving puzzles and have experience persevering through technical challenges
  • Are excited to learn new tools, platforms, and programming languages
  • Are able to obtain a Top Secret security clearance by your start date and can ultimately obtain a TS/SCI with polygraph clearance. If selected, you will be subject to a government security clearance investigation and must meet the requirements for access to classified information; eligibility requirements include U.S. citizenship.

Nice To Haves

  • Are graduating with a Master’s degree in Computer Engineering, Computer Science, Electrical Engineering, or a related field
  • Participate in hackathons, CTFs, cybersecurity clubs or other relevant extracurriculars
  • Have relevant internship experience
  • Understand Unix/Linux operating systems
  • Are familiar with assembly language
  • Are skilled with tools including oscilloscopes, multi-meters, power supplies, and logic analyzers
  • Have demonstrated leadership experience
  • Possess an active TS/SCI clearance with full scope polygraph

Responsibilities

  • Be mentored by top experts to learn the art and science of reverse engineering
  • Perform deep investigations of software, firmware, and hardware
  • Develop exploits against embedded systems
  • Build mission-aligned capabilities
  • Propose new ideas for internal and external funding opportunities
  • Share knowledge by clearly articulating ideas through papers and presentations to team members, APL management, and government decision makers.

Benefits

  • generous benefits
  • robust education assistance program
  • unparalleled retirement contributions
  • healthy work/life balance
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service