About the job
Join STR as a Senior Software Reverse Engineer, where your enthusiasm for researching and analyzing vulnerabilities in cyber-physical systems will be put to impactful use. This position requires on-site work.
Your Responsibilities:
- Reverse engineer complex software and firmware targets, including standard Windows/Linux binaries and embedded firmware across diverse computer architectures and operating systems.
- Develop and implement automated reverse engineering and binary analysis tools to analyze protocols, interfaces, and functionalities of target systems.
- Create innovative cybersecurity solutions to address pressing security challenges.
- Collaborate within multidisciplinary teams to solve complex problems across varied technologies, driving the development of cutting-edge cybersecurity solutions.
- Conduct vulnerability weaponization, exploit development, payload creation, and exploit mitigation on a diverse array of challenging targets.
- Document, demonstrate, and present your research findings effectively.
- Engage in solving real-world challenges that significantly impact national security.
Your Profile:
- An Active Top Secret (TS) security clearance is required, requiring U.S. citizenship as mandated by the U.S. Government.
- A Bachelor's Degree in Computer Science, Computer Engineering, Cybersecurity, or a related field, accompanied by a minimum of 5 years of relevant experience (consideration for MS or PhD with equivalent experience).
- Proven experience in binary analysis of software and firmware.
- Familiarity with disassembly tools such as IDA Pro, Binary Ninja, or Ghidra.
- Proficiency in programming languages, including C/C++ and Python.
- Knowledge of one or more Assembly Languages like x86 or ARM.
- Solid understanding of reverse engineering principles, including memory layout and calling conventions.
Preferred Qualifications:
- Experience in vulnerability research and analysis.
- Knowledge of transforming identified vulnerabilities into exploits.
- Experience in implant or software patch development.
- Familiarity with binary emulation and vulnerability research tools such as QEMU or AFL++.
- Experience with DSP architectures from manufacturers like Texas Instruments, STMicroelectronics, NXP, or Analog Devices.
- Understanding of operating system internals, including memory, process, and thread management.
- Expertise in embedded systems or firmware analysis.
- Experience in developing custom emulation tools for dynamic analysis.
- Skills in disassembler/decompiler module development.
- Experience in code/data flow analysis and reconstruction.
- Experience in automated reverse engineering or software analysis tool development.
- Ability to debug software without source code.
- Understanding of binary file structures and formats.
- Experience analyzing protocols or message structures.

