Cyber Vulnerability Researcher / Reverse Engineer

Battelle Memorial Institute   •  

Columbus, OH

Industry: Software

  •  

Less than 5 years

Posted 264 days ago

This job is no longer available.

JOB RESPONSIBILITIES AND EXPECTATIONS:

  • Collaborate with the Cyber Innovations Team to improve vulnerability research (VR) tools, reverse engineering (RE) tools, and testing tools for a variety of platforms to include Windows, Linux, Android, iOS, embedded, and IoT devices
  • Work with senior staff to identify strengths and weaknesses of solutions, conclusions and problem approaches
  • Complete structured assignments of clearly defined tasking under direct supervision. Seeks direction to prioritize assignments and identify subsequent tasking
  • Work with internal stakeholders to support preparation of presentations and reports and may be called on to respond to questions regarding assigned tasks
  • Contribute to Internal Research and Development (IRAD) studies
  • Communicate effectively with a multi-disciplinary team and task lead regarding status of assigned work and issues that arise

THE FOLLOWING REQUIREMENTS MUST BE MET TO BE CONSIDERED FOR THIS POSITION:

  • Bachelor’s degree in Computer Science, Computer Engineering, Electrical Engineering, or related field of study, or equivalent experience
  • 0-2 years’ experience in Computer Science, Computer Engineering, Electrical Engineering, or related technical area
  • Develop software to run in user-mode or kernel-mode
  • Ability to code in C or C++
  • Understanding of PC and embedded systems architecture to include boot processes and OS internals
  • Understand network protocols
  • Exposure to one or more assembly languages (x86, x64, ARM, MIPS, PowerPC, etc.)
  • Ability to demonstrate good organization, communication, problem solving, and teamwork skills
  • Must be a sole US citizen with the ability to obtain and maintain a US government security clearance

THE FOLLOWING IS DESIRED, BUT NOT REQUIRED TO BE CONSIDERED FOR THIS POSITION:

  • Experience with one or more debuggers such as OllyDbg, WinDbg, or gdb
  • Ability to apply learned cyber skills to real life scenarios (internships, hack-a-thons, cybersecurity clubs, CTFs, etc.)
  • Ability to analyze assembly-level code on multiple platforms (x86, x64, ARM, MIPS, PowerPC, etc.)
  • Ability to analyze network protocols throughout all layers of the network stack
  • Ability to use a scriptinglanguage (Python, Perl, Ruby, etc.)
  • Knowledge of common mitigation techniques (DEP, ASLR, etc.)
  • Background in software engineering and architecture
  • Previous exposure to malware reverse engineering
  • Active Secret or Top-Secret Clearance