Today
Secret
Mid Level Career (5+ yrs experience)
Unspecified
Engineering - Systems
Columbus, OH (On-Site/Office)
Vulnerability Researcher
Columbus, Ohio
Secret clearance
Key Qualifications
• Bachelor’s degree in related field with 5 years of experience; or Master’s degree in related field with 2 years of experience; or PhD in related field; or an equivalent combination of education and/or experience in a related field
• Strong understanding in reading assembly language and using debugging tools
• Experience with a disassembler for vulnerability research (Ghidra, IDA Pro, BinaryNinja)
• Experience with one or more assembly languages (x86, x64, ARM, MIPS, PowerPC, etc.)
• Experience with one or more debuggers (WinDbg, OllyDbg, gdb)
• Experience with vulnerability research on one or more operating systems: Android, iOS, Windows, Linux, MacOS, VxWorks, QNX, RTOSs, or other custom operating systems
• Knowledge of advanced exploitation techniques (ret2libc,use-after-free,type confusion)
• Knowledge of exploit protection techniques (DEP, ASLR/NX)
• Ability to code in C and/or Python
• Ability to work individually and in small fast-paced team environments
• Passion and drive to constantly need to improve your skill set
• Must Be a US Citizen with the ability and willingness to obtain a DoD Secret or higher clearance
Preferred Qualifications
• Understanding of network protocols
• Experience with AI/ML
• Experience with microcontrollers
• Experience emulating embedded platforms for live debugging
• Experience using fuzzing tools such as AFL or Peach
• Concolic analysis research and implementation
• Experience with symbolic analysis
• Active DoD Secret security clearance
Columbus, Ohio
Secret clearance
Key Qualifications
• Bachelor’s degree in related field with 5 years of experience; or Master’s degree in related field with 2 years of experience; or PhD in related field; or an equivalent combination of education and/or experience in a related field
• Strong understanding in reading assembly language and using debugging tools
• Experience with a disassembler for vulnerability research (Ghidra, IDA Pro, BinaryNinja)
• Experience with one or more assembly languages (x86, x64, ARM, MIPS, PowerPC, etc.)
• Experience with one or more debuggers (WinDbg, OllyDbg, gdb)
• Experience with vulnerability research on one or more operating systems: Android, iOS, Windows, Linux, MacOS, VxWorks, QNX, RTOSs, or other custom operating systems
• Knowledge of advanced exploitation techniques (ret2libc,use-after-free,type confusion)
• Knowledge of exploit protection techniques (DEP, ASLR/NX)
• Ability to code in C and/or Python
• Ability to work individually and in small fast-paced team environments
• Passion and drive to constantly need to improve your skill set
• Must Be a US Citizen with the ability and willingness to obtain a DoD Secret or higher clearance
Preferred Qualifications
• Understanding of network protocols
• Experience with AI/ML
• Experience with microcontrollers
• Experience emulating embedded platforms for live debugging
• Experience using fuzzing tools such as AFL or Peach
• Concolic analysis research and implementation
• Experience with symbolic analysis
• Active DoD Secret security clearance
group id: 10430885