2026 PhD Graduate – Vulnerability Researcher – Offensive Cyber Capabilities

Johns Hopkins Applied Physics LaboratoryLaurel, MD
181d

About The Position

Are you a creative researcher who loves to imagine new solutions to complex problems? Do you have an insatiable curiosity to understand how technology works from the inside out? Are you eager to solve some our nation’s hardest cyber challenges and have real impact? If so, we want you to join our elite team of reverse engineers at APL! Our team specializes in software and hardware reverse engineering, vulnerability research, and developing offensive cyber capabilities with a focus on embedded systems. We have custom facilities tailored to specific classes of systems including vehicles, telecommunications/network infrastructure, and other cyber-physical systems as well as general reverse engineering labs. As a member of our group, you will... • Create and use cutting-edge techniques for automating reverse engineering and vulnerability analysis • Cultivate deep technical expertise of software, firmware, and hardware platforms • Develop exploits against bespoke embedded systems • Collaborate with government sponsors and operators to build mission-aligned capabilities • Deepen your expertise by working with reverse engineering experts • Widen your expertise by engaging with experts in other fields as you tackle problems intersecting other technical domains • Present research to team members, APL management, government decision makers, and the larger cybersecurity community in academia and industry

Requirements

  • Are graduating with a PhD in Computer Engineering, Computer Science, Electrical Engineering, or a related field
  • Have an excellent academic record with demonstrated mastery of fundamental topics such as computer architecture, operating systems, and data structures
  • Are proficient with one or more programming languages
  • Love solving puzzles and are excited to learn new tools, platforms, and programming languages
  • Are able to obtain an Interim Top Secret security clearance by your start date and can ultimately obtain a TS/SCI with polygraph clearance. If selected, you will be subject to a government security clearance investigation and must meet the requirements for access to classified information; eligibility requirements include U.S. citizenship.

Nice To Haves

  • Have an existing portfolio of research related to vulnerability analysis
  • Are experienced using debuggers and reverse engineering tools such as Ghidra
  • Are familiar with assembly
  • Participate in hackathons, CTFs, or other relevant cybersecurity activities
  • Understand Unix/Linux operating systems and embedded systems development toolchains
  • Have experience with hardware debugging interfaces, code security mechanisms and their weaknesses, hardware diagnostic tools, and signal/protocol analysis
  • Possess an active TS/SCI clearance with full scope polygraph.

Responsibilities

  • Create and use cutting-edge techniques for automating reverse engineering and vulnerability analysis
  • Cultivate deep technical expertise of software, firmware, and hardware platforms
  • Develop exploits against bespoke embedded systems
  • Collaborate with government sponsors and operators to build mission-aligned capabilities
  • Deepen your expertise by working with reverse engineering experts
  • Widen your expertise by engaging with experts in other fields as you tackle problems intersecting other technical domains
  • Present research to team members, APL management, government decision makers, and the larger cybersecurity community in academia and industry

Benefits

  • generous benefits
  • a robust education assistance program
  • unparalleled retirement contributions
  • a healthy work/life balance

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Entry Level

Education Level

Ph.D. or professional degree

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service