What are the responsibilities and job description for the Vulnerability Researcher/Reverse Engineer position at TekStream Solutions?
Our client is currently seeking an aspiring Vulnerability Researcher/Reverse Engineer to work in their Chantilly, VA location.
As a Vulnerability Researcher, you will work with disassemblers and debuggers to quickly understand how embedded devices operate. You will use and build tools that push past the edge of current tools and techniques. In a given day you will research and debug an embedded device while getting the chance to bounce ideas off of a close-knit team of researchers. We have the tools and the mentors you will need to take yourself to the next level and who are eager to learn from your experience.
Key Qualifications
- Bachelor’s degree in Computer Science, Computer Engineering, Electrical Engineering, or related field of study with 8 years of experience; Master’s degree in related field with 5 years of experience; PhD in a related field with 2 years of experience; or an equivalent combination of education and experience
- Develop software to run in user-mode or kernel-mode
- Strong understanding in reading assembly language and using debugging tools
- Experience with a disassembler for vulnerability research (Ghidra, IDA Pro, BinaryNinja)
- Experience with one or more assembly languages (x86, x64, ARM, MIPS, PowerPC, etc.)
- Experience with one or more debuggers (WinDbg, OllyDbg, gdb)
- Experience with vulnerability research on one or more operating systems: Android, iOS, Windows, Linux, MacOS, VxWorks, QNX, RTOSs, or other custom operating systems
- Knowledge of advanced exploitation techniques (ret2libc,use-after-free,type confusion)
- Knowledge of exploit protection techniques (DEP, ASLR/NX)
- Ability to code in C
- Understanding of network protocols
- Ability to work individually and in small fast paced team environments
- Passion and drive to constantly need to improve your skill set
- Must Be a US Citizen with the ability and willingness to obtain a Secret or higher clearance
Preferred Qualifications
- Experience using fuzzing tools such as AFL or Peach
- Concolic analysis research and implementation
- Experience emulating embedded platforms for live debugging
- Experience with microcontrollers
- Experience with symbolic analysis
- Active Secret security clearance or ability to obtain one