STR is hiring a Software Reverse Engineer who has a passion for research and analysis of vulnerabilities in cyber physical systems. Work must be performed onsite.
What you'll do:
- Reverse engineering complex software or firmware targets, ranging from typical Windows/Linux binaries to embedded firmware running non-traditional computer architectures and operating systems.
- Developing and applying automated reverse engineering and binary analysis tools to characterize protocols, interfaces, and functionality of target systems.
- Developing innovative cybersecurity solutions.
- Working in multi-discipline teams to tackle challenging problems from a wide variety of technologies to develop innovative cybersecurity solutions.
- Performing vulnerability weaponization, exploit development, payload development, and exploit mitigation on a variety of challenging targets.
- Developing custom emulation solutions to enable dynamic analysis.
- Documenting, demonstrating, and presenting research.
- Solving real world problems that have an impact on national security.
Who you are:
- This position requires an Active Top Secret (TS) security clearance, for which U.S. citizenship is needed by the U.S. Government.
- BS, MS or PhD in Computer Science, Computer Engineering, Cybersecurity or related field (or equivalent work experience).
- Experience with binary analysis of software/firmware.
- Experience with disassembly tools, such as IDA Pro, Binary Ninja, or Ghidra.
- Experience with DSP architectures, such as Texas Instruments, STMicroelectronics, NXP, or Analog Devices.
- Proficiency in one or more programming languages: C/C++, Python, etc.
- Proficiency in one or more Assembly Languages: x86, ARM, etc.
- General understanding of reverse engineering fundamentals: memory layout, calling conventions, etc.
Nice to haves:
- Vulnerability research and analysis.
- Knowledge of weaponizing discovered vulnerabilities into exploits.
- Implant or software patch development.
- Familiarity with binary emulation or vulnerability research, including tools such as QEMU or AFL++.
- Operating system internals including memory/process/thread management.
- Embedded systems or firmware analysis.
- Knowledge of anti-reverse engineering techniques.
- Analyzing protocols or message structures.
- Knowledge of binary file structures and formats.
- Developing automated reverse engineering or software analysis tools.
- Debugging software without source code.
- Analyzing and reconstructing code/data flow.
- Knowledge of intrusion detection and anti-malware systems and techniques.
STR is a growing technology company with locations near Boston, MA, Arlington, VA, near Dayton, OH, Melbourne, FL, and Carlsbad, CA. We specialize in advanced research and development for defense, intelligence, and national security in: cyber; next generation sensors, radar, sonar, communications, and electronic warfare; and artificial intelligence algorithms and analytics to make sense of the complexity that is exploding around us.
STR is committed to creating a collaborative learning environment that supports deep technical understanding and recognizes the contributions and achievements of all team members. Our work is challenging, and we go home at night knowing that we pushed the envelope of technology and made the world safer.
STR is not just any company. Our people, culture, and attitude along with their unique set of skills, experiences, and perspectives put us on a trajectory to change the world. We can't do it alone, though - we need fellow trailblazers. If you are one, join our team and help to keep our society safe! Visit us at for more info.
#J-18808-Ljbffr