Vacancy expired!
At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.
Join Northrop Grumman - Xetron, part of Mission Systems sector, focused on the development of new capabilities for our military and intelligence customers around the globe.As a small Operating Unit of the larger Northrop Grumman Corporation located in Cincinnati Ohio, Xetron is a rare example of a company with a small business culture operating collaboratively with its larger business entity. This unique environment offers employees the ability to know everyone at the site at a personal level while still working on technologies and products that are beyond state-of-the-art with global impact. You'll get the opportunity to wrestle with the next big problems in an atmosphere of collaboration and cooperation, sharing your expertise with team members at all levels.We are seeking a mid-career to senior, cleared or clearable Vulnerability Research Engineer who is self-motivated and energetic. Essential Functions:- Perform vulnerability and reverse engineering on embedded systems
- Perform vulnerability analysis on user and kernel mode drivers & interfaces
- Develop, document, and demonstrate proof of concepts on based research findings
- BS degree in STEM discipline such as Math, Physics, Electrical Engineering, Computer Science, Computer Engineering and 2 years of experience or MS degree in STEM discipline such as Math, Physics, Electrical Engineering, Computer Science, Computer Engineering and 0 years of experience. Note: 4 years of experience can be used is lieu of a degree
- Experience with a disassembler for vulnerability research (IDA Pro, Ghidra, BinaryNinja, radare2, etc.)
- Experience in C or C
- US Citizenship and ability to obtain and maintain a Top-Secret clearance to start
- BS degree in STEM discipline such as Math, Physics, Electrical Engineering, Computer Science, Computer Engineering and 4 years of experience or MS degree in STEM discipline such as Math, Physics, Electrical Engineering, Computer Science, Computer Engineering and 2 years of experience or PhD in STEM discipline such as Math, Physics, Electrical Engineering, Computer Science, Computer Engineering and 0 years of experience. Note: 4 years of experience can be used is lieu of a degree
- Experience with a disassembler for vulnerability research (IDA Pro, Ghidra, BinaryNinja, radare2, etc.)
- Experience in C or C
- US Citizenship and ability to obtain and maintain a Top-Secret clearance to start
- Active Top-Secret clearance
- Experience with one or more assembly languages (x86, x64, ARM, MIPS, etc.)
- Development of disassembler extensions for tools such as IDA pro or Ghidra
- Low level debug tools such as gdb, WinDbg, or OllyDbg
- Experience with fuzzing research techniques (AFL, taint analysis, PIN, Dynamic Memory Instrumentation, etc.)
- Experience with vulnerability research on one or more operating systems (Android, IOS, Windows, Linux, etc.)
- Reverse engineering hardware and software such as embedded systems (IoT), mobile devices/phones
- Development of software to run in user mode or kernel mode
- Certified Reverse Engineering Analyst (CREA)
Vacancy expired!