This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
STR is hiring a Senior Software Reverse Engineer who has a passion for research and analysis of vulnerabilities in cyber physical systems.
Job Responsibility:
Reverse engineering complex software or firmware targets, ranging from typical Windows/Linux binaries to embedded firmware running non-traditional computer architectures and operating systems
Developing and applying automated reverse engineering and binary analysis tools to characterize protocols, interfaces, and functionality of target systems
Developing innovative cybersecurity solutions
Working in multi-discipline teams to tackle challenging problems from a wide variety of technologies to develop innovative cybersecurity solutions
Performing vulnerability weaponization, exploit development, payload development, and exploit mitigation on a variety of challenging targets
Documenting, demonstrating, and presenting research
Solving real world problems that have an impact on national security
Requirements:
Active Top Secret (TS) security clearance
U.S. citizenship
Bachelors Degree in Computer Science, Computer Engineering, Cybersecurity or related field plus a minimum of 5 years relevant experience
Experience with binary analysis of software/firmware
Experience with disassembly tools, such as IDA Pro, Binary Ninja, or Ghidra
Proficiency in one or more programming languages: C/C++, Python, etc.
Proficiency in one or more Assembly Languages: x86, ARM, etc.
General understanding of reverse engineering fundamentals: memory layout, calling conventions, etc.
Nice to have:
Vulnerability research and analysis
Knowledge of weaponizing discovered vulnerabilities into exploits
Implant or software patch development
Familiarity with binary emulation or vulnerability research, including tools such as QEMU or AFL++
Experience with DSP architectures, such as Texas Instruments, STMicroelectronics, NXP, or Analog Devices.
Knowledge of operating system internals including memory/process/thread management
Embedded systems or firmware analysis
Experience development custom emulation tools to enable dynamic analysis
Disassembler/decompiler module development
Experience analyzing and reconstructing code/data flow
Automated reverse engineering or software analysis tool development
Experience debugging software without source code
Knowledge of binary file structures and formats
Experience analyzing protocols or message structures
Knowledge of anti-reverse engineering techniques
Knowledge of intrusion detection and anti-malware systems and techniques