We are seeking motivated developers, computer scientists, computer engineers, and cyber researchers who are passionate about advancing the field of cybersecurity. The Systems Exploitation team performs vulnerability research, develops novel cyber capabilities, and pioneers groundbreaking approaches to defeat sophisticated security protections. As an intern in the Systems Exploitation group, you may exploit hardware, firmware, and software, reverse engineer embedded systems, collaborate with teammates to identify vulnerabilities or security weaknesses stemming from publicly disclosed information or previously unknown vulnerabilities, aid in the development of proof-of-concept capabilities or extend existing capabilities, explore techniques for automating binary analysis and reverse engineering, and learn from experts in the field of software development, reverse engineering, and vulnerability analysis. Interns typically work as part of a larger team and are given tasking scoped to match the duration of their stay. At the end of the internship, each intern prepares a short presentation highlighting their work and project contributions.