Job Title: Lead, Security and Vunerability Research Engineer
Job Code: 1934
Job Location: Palm Bay, FL
Job Description:
Responsible for the internal or customer administration, maintenance and management of capacity resources for computers at the operating system and infrastructure level. Builds, configures, troubleshoots and integrates new and existing servers to provide service enhancements, application deployments and infrastructure upgrades. Sets up administrator and service accounts, maintains system documentation, tunes system performance, installs system-wide software, and allocates mass storage space. Recommends software and hardware enhancements, diagnoses and corrects issues, defines and implements new services with the goal of achieving maximum server uptime and availability for the customers. Responsible for monitoring performance, system usage. Contributes towards the Disaster Recovery Plan (DRP), backup systems and disk configurations. Conducts system analysis and development to keep systems current with changing technologies.
Essential Functions:
• Conducting research for the purposes of finding new vulnerabilities and enhancing existing capabilities
• Circumventing security protection methods and techniques
• Reverse engineering complex systems and protocols
• Creating detailed technical reports to document findings and writing proof of concept code
Qualifications:
• Bachelor's Degree and a minimum of 9+ years of prior related experience. Graduate Degree or equivalent with 7+ years of prior related experience. In lieu of a degree, minimum of 15 years of prior related experience.
• Understanding of Cellular (2G/4G/5G Wireless) & Malware/Exploit Detection
• Experience analyzing and reverse engineering architectures, such as: AARCH32, AARCH 64, & C66x
• Experience programing with languages such as: Python, C, C++, C#, Java, and JavaScript
• Experience working within Protection / Privilege Levels: Bootchain, Kernelmode,TrustZone, Sandbox, Usermode
• Experience working with classes of exploitation, such as: Local Privilege Escalation (LPE), Remote Code Execution (RCE), Sandbox Escape, Stack Overflow, DEP, ASLR, etc.
• Experience working with Reverse Engineering Tools, such as: GDB, JTAG, Ghidra or IDA PRO (Hex-rays Decompiler).
• Experience using development applications, such as CLion, Clang/LLVM, CMake, CCS
• Current/active TS/SCI security clearance
Preferred Additional Skills:
• Extensive knowledge of C/C++, python, assembly language or additional scripting and programming languages
• Experience in reverse engineering
• Experience with disassembly tools
• Experience with vulnerability research
• Experience with RISC architectures
• Experience with prevalent radio communication protocols
• Experience with operating system internals including solid knowledge of information security, computer architecture, software and hardware protection schemes, and virtualization theory
• Experience with userland and kernel mode debugging, including debugging in embedded environments
• Experience writing custom IDA loaders, processor modules, IDA python, and Hex-Rays decompiler plugins
• Knowledge of fuzzing and virtualization
• GIAC/ISC2/CEH Certifications
• Active TS/SCI Security Clearance with CI Poly highly preferred