Logo
STR

Lead Software Reverse Engineer

STR, Woburn, Massachusetts, us, 01813

Save Job

STR is hiring a

Lead Software Reverse Engineer

who has a passion for research and analysis of vulnerabilities in cyber physical systems. Work must be performed onsite. Overview

STR is a growing technology company with locations near Boston, MA, Arlington, VA, near Dayton, OH, Melbourne, FL, and Carlsbad, CA. We specialize in advanced research and development for defense, intelligence, and national security in: cyber; next generation sensors, radar, sonar, communications, and electronic warfare; and artificial intelligence algorithms and analytics to make sense of the complexity that is exploding around us. What you’ll do

Reverse engineering complex software or firmware targets, ranging from typical Windows/Linux binaries to embedded firmware running non-traditional computer architectures and operating systems Developing and applying automated reverse engineering and binary analysis tools to characterize protocols, interfaces, and functionality of target systems Developing innovative cybersecurity solutions Working in multi-discipline teams to tackle challenging problems from a wide variety of technologies to develop innovative cybersecurity solutions Performing vulnerability weaponization, exploit development, payload development, and exploit mitigation on a variety of challenging targets Documenting, demonstrating, and presenting research Solving real world problems that have an impact on national security Who you are

This position requires the ability to obtain a security clearance, for which U.S. citizenship is needed by the U.S. Government Bachelors Degree in Computer Science, Computer Engineering, Cybersecurity or related field plus a minimum of 7 years relevant experience (MS or PhD with equivalent work experience may also be considered) Experience with binary analysis of software/firmware Experience with disassembly tools, such as IDA Pro, Binary Ninja, or Ghidra Proficiency in one or more programming languages: C/C++, Python, etc. Proficiency in one or more Assembly Languages: x86, ARM, etc. General understanding of reverse engineering fundamentals: memory layout, calling conventions, etc. Nice to have

Vulnerability research and analysis Knowledge of weaponizing discovered vulnerabilities into exploits Implant or software patch development Familiarity with binary emulation or vulnerability research, including tools such as QEMU or AFL++ Experience with DSP architectures, such as Texas Instruments, STMicroelectronics, NXP, or Analog Devices Knowledge of operating system internals including memory/process/thread management Embedded systems or firmware analysis Experience developing custom emulation tools to enable dynamic analysis Experience analyzing and reconstructing code/data flow Automated reverse engineering or software analysis tool development Experience debugging software without source code Knowledge of binary file structures and formats Experience analyzing protocols or message structures Knowledge of anti-reverse engineering techniques Knowledge of intrusion detection and anti-malware systems and techniques STR is committed to creating a collaborative learning environment that supports deep technical understanding and recognizes the contributions and achievements of all team members. Our work is challenging, and we go home at night knowing that we pushed the envelope of technology and made the world safer. Equal Employment Opportunity

STR is an equal opportunity employer. We are fully dedicated to hiring the most qualified candidate regardless of race, color, religion, sex (including gender identity, sexual orientation and pregnancy), marital status, national origin, age, veteran status, disability, genetic information or any other characteristic protected by federal, state or local laws.

#J-18808-Ljbffr