Vacancy expired!
- Five (5) plus years' experience with reverse engineering compiled programs (e.g. C/C)
- Fluency reading common assembly languages (e.g. x86, x86-64, ARM)
- Five (5) plus years' experience developing in scripting languages (e.g. Python, Javascript)
- Experience and familiarity with debuggers and decompilers (e.g. gdb, Binja, IDA Pro)
- Ability to obtain and maintain a U.S. security clearance
- Experience developing/defeating mitigations (e.g. ASLR, DEP, NX)
- Experience developing defeats of common anti-RE techniques (e.g. obfuscation)
- Detailed understanding of embedded platforms (e.g. FPGA, physical memory)
- Experience with securely implemented cryptographic primitives (e.g. AES-GCM, SHA256, ECDSA)
- Familiarity with program analysis tools and techniques (e.g. control flow, heap grooming, taint tracing)
- Experience with effective use of automated analysis (e.g. fuzzers, emulation, sandbox)
- Deep knowledge of file systems and formats (e.g. ELF, PE, Mach-O)
- Effective communication with customers and teammates
- Experience developing proof-of-concept exploits
- Active TS/SCI
- Security Clearance:
Vacancy expired!