Software Vulnerability Researcher

Booz Allen HamiltonUsa, VA
8dHybrid

About The Position

Software Vulnerability Researcher Key Role: Provide reverse engineering, static, and dynamic binary analysis, and vulnerability analysis of sof tware on a variety of different platforms and operating systems. Write proof-of-concept sof tware that simulates the behavior of analyzed binaries and their interactions with other system components and validate any discovered vulnerabilities. Author technical documentation of research or findings as it relates to all security mechanisms, including access control, encryption, and obfuscation.

Requirements

  • Experience with Python, C, or C++ programming languages
  • Experience with embedded device sof tware development and the compilers, linkers, and binary code generation process
  • Experience with static reverse engineering of sof tware binaries, including Ghidra or IDA Pro
  • Experience finding and exploiting vulnerabilities in firm ware binaries using static and dynamic reverse engineering techniques
  • Experience with modern sof tware exploitation techniques, secure boot process, and bootloader design implementation for iOS or Android platforms
  • Experience with microcontroller security architecture and integrations, including ARM architecture, assembly language, or mobile OSs, such as Android or iOS
  • Experience extending or modifying developed exploit chains to devices or microcontrollers
  • Top Secret clearance
  • Bachelor's degree and 10+ years of experience with reverse engineering or vulnerability analysis, or 15+ years of experience with reverse engineering or vulnerability analysis in lieu of a degree

Nice To Haves

  • Experience with forensics analysis of media
  • Experience analyzing packet captures with tools, including Wireshark
  • Knowledge of operating systems and security practices
  • Knowledge of cryptographic algorithms and protocols
  • TS/SCI clearance with a polygraph
  • Bachelor's degree in CS, Electrical Engineering, Computer Engineering, Science, Technology, Engineering, or Mathematics

Responsibilities

  • Provide reverse engineering, static, and dynamic binary analysis, and vulnerability analysis of software on a variety of different platforms and operating systems.
  • Write proof-of-concept software that simulates the behavior of analyzed binaries and their interactions with other system components and validate any discovered vulnerabilities.
  • Author technical documentation of research or findings as it relates to all security mechanisms, including access control, encryption, and obfuscation.

Benefits

  • health
  • life
  • disability
  • financial
  • retirement benefits
  • paid leave
  • professional development
  • tuition assistance
  • work-life programs
  • dependent care
  • recognition awards program
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service