Principal Software Reverse Engineer

STRMelbourne, FL
16h$204,000 - $284,000Onsite

About The Position

STR is hiring a Principal Software Reverse Engineer who has a passion for research and analysis of vulnerabilities in cyber physical systems. This opportunity will be part of a multidisciplinary team of researchers and engineers dedicated to developing cutting-edge technologies with significant and immediate impact on our national security. This position offers an excellent opportunity to work at the nexus of computers and real-world physical systems. We believe that each employee has a unique set of skills, experiences, and perspectives that are essential to providing our customers with innovative solutions. The skills listed below are representative of those needed for this role but are not the only acceptable set. If you see an overlap with your skills, go ahead and apply!. Work must be performed onsite and Active Top Secret (TS) Clearance required.

Requirements

  • This position requires an Active Top Secret (TS) security clearance, for which U.S. citizenship is needed by the U.S. Government.
  • Bachelors Degree in Computer Science, Computer Engineering, Cybersecurity or related field plus a minimum of 15 years relevant experience
  • (MS or PhD with equivalent work experience may also be considered)
  • Substantial experience leading technical teams on advanced reverse engineering and exploitation programs
  • Experience with binary analysis of software/firmware
  • Experience with disassembly tools, such as IDA Pro, Binary Ninja, or Ghidra
  • Proficiency in multiple Assembly Languages: x86, ARM, etc.
  • Proficiency in one or more programming languages: C/C++, Python, etc.
  • Deep understanding of reverse engineering fundamentals
  • Experience in Vulnerability research and analysis
  • Knowledge of weaponizing discovered vulnerabilities into exploits

Nice To Haves

  • Implant or software patch development
  • Familiarity with binary emulation or vulnerability research, including tools such as QEMU or AFL++
  • Experience with DSP architectures, such as Texas Instruments, STMicroelectronics, NXP, or Analog Devices.
  • Knowledge of operating system internals including memory/process/thread management
  • Embedded systems or firmware analysis
  • Experience development custom emulation tools to enable dynamic analysis
  • Disassembler/decompiler module development
  • Experience analyzing and reconstructing code/data flow
  • Automated reverse engineering or software analysis tool development
  • Experience debugging software without source code
  • Knowledge of binary file structures and formats
  • Experience analyzing protocols or message structures
  • Knowledge of anti-reverse engineering techniques
  • Knowledge of intrusion detection and anti-malware systems and techniques

Responsibilities

  • Reverse engineering complex software or firmware targets, ranging from typical Windows/Linux binaries to embedded firmware running non-traditional computer architectures and operating systems
  • Developing and applying automated reverse engineering and binary analysis tools to characterize protocols, interfaces, and functionality of target systems
  • Developing innovative cybersecurity solutions
  • Leading multi-discipline teams to tackle challenging problems from a wide variety of technologies to develop innovative cybersecurity solutions
  • Performing vulnerability weaponization, exploit development, payload development, and exploit mitigation on a variety of challenging targets
  • Technical marketing to existing and potential customers
  • Technical proposal development (idea generation, writing, reviewing, editing)
  • Documenting, demonstrating, and presenting research
  • Solving real world problems that have an impact on national security
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service