Booz Allen Hamilton-posted 5 days ago
Full-time • Mid Level
Quantico, VA

Software Vulnerability Researcher Key Role: Provide reverse engineering, static, and dynamic binary analysis, and vulnerability analysis of software on a variety of different platforms and operating systems. Write proof-of-concept software that simulates the behavior of analyzed binaries and their interactions with other system components and validate any discovered vulnerabilities. Author technical documentation of research or findings as it relates to all security mechanisms, including access control, encryption, and obfuscation.

  • Provide reverse engineering, static, and dynamic binary analysis, and vulnerability analysis of software on a variety of different platforms and operating systems.
  • Write proof-of-concept software that simulates the behavior of analyzed binaries and their interactions with other system components and validate any discovered vulnerabilities.
  • Author technical documentation of research or findings as it relates to all security mechanisms, including access control, encryption, and obfuscation.
  • Experience with Python, C, or C++ programming languages
  • Experience with embedded device software development and the compilers, linkers, and binary code generation process
  • Experience with static reverse engineering of software binaries, including Ghidra or IDA Pro
  • Experience finding and exploiting vulnerabilities in firmware binaries using static and dynamic reverse engineering techniques
  • Experience with modern software exploitation techniques, secure boot process, and bootloader design implementation for iOS or Android platforms
  • Experience with microcontroller security architecture and integrations, including ARM architecture, assembly language, or mobile OSs, such as Android or iOS
  • Experience extending or modifying developed exploit chains to devices or microcontrollers
  • Top Secret clearance
  • Bachelor's degree and 3+ years of experience with reverse engineering or vulnerability analysis, or 10+ years of experience with reverse engineering or vulnerability analysis in lieu of a degree
  • Experience with forensics analysis of media
  • Experience analyzing packet captures with tools, including Wireshark
  • Knowledge of operating systems and security practices
  • Knowledge of cryptographic algorithms and protocols
  • TS/SCI clearance with a polygraph
  • Bachelor's degree in CS, Electrical Engineering, Computer Engineering, Science, Technology, Engineering, or Mathematics
  • health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, work-life programs, and dependent care.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service