Nightwing Intelligence Solutions-posted 6 days ago
Full-time • Mid Level
Onsite • San Antonio, TX

Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers’ most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. When we formed Nightwing, we brought a deep set of credentials and an unfaltering commitment to the mission. For over four decades, our team has been providing some of the world’s most technically advanced full-spectrum cyber, data operations, systems integration and intelligence support services to the U.S. government on its most important missions. At Nightwing, we value collaboration and teamwork. You’ll have the opportunity to work alongside talented individuals who are passionate about what they do. Together, we’ll leverage our collective expertise to drive innovation, solve complex problems, and deliver exceptional results for our clients. Job Summary Vulnerability Researchers at NightWing CODEX analyze systems to understand how they work and how they behave when they break. Candidates must be able to play both sides of the fence, both developing and defeating new and advanced security techniques. Projects are undertaken in small teams with close coordination with customers. All our engineers write code, but many of our engineers spend as much time taking systems apart as building new ones. A typical day can involve studying disassembly or writing Python to audit a piece of C++ code.

  • Ability to obtain a U.S. Government TS/SCI Clearance
  • Experience with C or C++
  • Experience with Python
  • BS/MS in technical discipline (Equivalent work experience will be considered)
  • Existing U.S. Government DOD TS or TS/SCI Clearance
  • Understanding of OS Internals (any major OS)
  • Experience reading or writing assembly (x86, x64, ARM, PPC, MIPS, SPARC, 68k, or others)
  • Familiarity with stack frames, calling conventions, and memory management
  • Experience developing embedded systems
  • Understanding of network protocols (TCP/IP stacks, wire-level protocols, RF communications, BGP, routing protocols, or others).
  • Understanding of exploit mitigations such as DEP and ASLR
  • Experience using reverse engineering tools such as Ghidra, IDA Pro, HexRays, Binary Ninja, or objdump.
  • Experience using debuggers such as gdb, WinDbg, OllyDbg
  • Experience building and using tools to find, exploit, and productize vulnerabilities in complex software systems
  • Utilizing full system emulation for research and analysis
  • parental (including paternal) leave
  • flexible work schedules
  • achievement awards
  • educational assistance
  • child/adult backup care
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service