Reverse Engineer Intern

Radiance TechnologiesHuntsville, AL
21d

About The Position

Unique opportunity to analyze and find vulnerabilities in non-traditional, complex systems. The ideal candidate is a curious engineer or scientist who enjoys diving into the details of how things work, why they work that way, and how they will fail. This role requires knowledge in a wide array of engineering and computing disciplines and an aptitude for deep-dive analytical thinking. Duties include using static and dynamic analysis tools to facilitate reverse engineering and vulnerability analysis efforts. This includes examining software for known and new vulnerabilities, reverse engineering software to understand the impact of vulnerabilities on the operation of the system, creating custom static and dynamic analysis tools for automated analysis, developing tools to analyze and inject datalink messages and other communication protocols, and documenting identified vulnerabilities and their impact in detail.

Requirements

  • Currently pursuing a Bachelor's degree in Electrical or Computer Engineering
  • US citizenship with the ability to obtain and maintain a security clearance
  • Experience applicable to analyzing, reverse engineering, and vulnerability analysis of software, hardware, and communications

Nice To Haves

  • Experience or familiarity with any of the following:
  • Master’s degree in Electrical or Computer Engineering
  • Radar systems
  • Machine Learning / Artificial Intelligence
  • Data Fusion
  • Reverse engineering
  • Vulnerability analysis
  • Programming languages such as C, C++, or Python
  • Software reverse engineering tools like Ghidra, IDA Pro, Kali, OllyDbg and Wireshark
  • Developing custom software and hardware tools to assist in performing reverse engineering and vulnerability analysis
  • Weapon system design or analysis
  • US Intelligence Community or DoD contracting
  • Active TS/SCI Clearance

Responsibilities

  • Using static and dynamic analysis tools to facilitate reverse engineering and vulnerability analysis efforts
  • Examining software for known and new vulnerabilities
  • Reverse engineering software to understand the impact of vulnerabilities on the operation of the system
  • Creating custom static and dynamic analysis tools for automated analysis
  • Developing tools to analyze and inject datalink messages and other communication protocols
  • Documenting identified vulnerabilities and their impact in detail
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service