Johns Hopkins Applied Physics Laboratory-posted 2 months ago
$22 - $47/Yr
Intern
Laurel, MD
5,001-10,000 employees
Educational Services

We are seeking motivated developers, computer scientists, computer engineers, and cyber researchers who are passionate about advancing the field of cybersecurity. The Systems Exploitation team performs vulnerability research, develops novel cyber capabilities, and pioneers groundbreaking approaches to defeat sophisticated security protections. As an intern in the Systems Exploitation group, you may exploit hardware, firmware, and software, reverse engineer embedded systems, collaborate with teammates to identify vulnerabilities or security weaknesses stemming from publicly disclosed information or previously unknown vulnerabilities, aid in the development of proof-of-concept capabilities or extend existing capabilities, explore techniques for automating binary analysis and reverse engineering, and learn from experts in the field of software development, reverse engineering, and vulnerability analysis. Interns typically work as part of a larger team and are given tasking scoped to match the duration of their stay. At the end of the internship, each intern prepares a short presentation highlighting their work and project contributions.

  • Exploit hardware, firmware, and software
  • Reverse engineer embedded systems
  • Collaborate with teammates to identify vulnerabilities or security weaknesses
  • Aid in the development of proof-of-concept capabilities or extend existing capabilities
  • Explore techniques for automating binary analysis and reverse engineering
  • Learn from experts in the field of software development, reverse engineering, and vulnerability analysis
  • Pursuing a Bachelor's degree, Master's degree, or PhD in Computer Science, Computer Engineering, Electrical Engineering, or a related discipline
  • Maintaining a minimum 3.0 GPA on a 4.0 scale
  • Proficient with programming languages such as C, C++, Python, Rust
  • Familiar with reverse engineering tools, software debuggers, and/or static analysis tools (Ghidra, IDA Pro, Binary Ninja, Windbg, gdb, etc)
  • Comfortable with Linux/Unix operating systems
  • Familiar with one or more assembly languages (x86/x64, ARM, MIPS, etc.)
  • Able to obtain an Interim Secret level security clearance by your start date and a final TS/SCI Clearance
  • Basic exploitation techniques such as buffer overflows and command injections
  • Experience with Capture the Flag exercises and/or hackathons
  • Windows, Linux, Android, and/or iOS internals
  • Cross compiling toolchains for embedded devices
  • Experience with hardware design or development (e.g., digital circuits, FPGAs, or embedded systems)
  • Familiarity with hardware interfaces and protocols such as I²C, SPI, and JTAG
  • Experience working with RF systems (e.g., wireless communications, software-defined radio, or RF debugging tools)
  • Symbolic execution engines such as angr
  • Generous benefits including a robust education assistance program
  • Unparalleled retirement contributions
  • Healthy work/life balance
  • Comprehensive benefits package including retirement plans, paid time off, medical, dental, vision, life insurance, short-term disability, long-term disability, flexible spending accounts, education assistance, and training and development
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service