Senior Software Reverse Engineer jobs in United States
cer-icon
Apply on Employer Site
company-logo

STR ยท 1 day ago

Senior Software Reverse Engineer

STR is a technology company specializing in advanced research and development for defense, intelligence, and national security. They are seeking a Senior Software Reverse Engineer to analyze vulnerabilities in cyber physical systems, develop innovative cybersecurity solutions, and work collaboratively on complex challenges.

Artificial Intelligence (AI)Machine Learning
check
Growth Opportunities
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Reverse engineering complex software or firmware targets, ranging from typical Windows/Linux binaries to embedded firmware running non-traditional computer architectures and operating systems
Developing and applying automated reverse engineering and binary analysis tools to characterize protocols, interfaces, and functionality of target systems
Developing innovative cybersecurity solutions
Working in multi-discipline teams to tackle challenging problems from a wide variety of technologies to develop innovative cybersecurity solutions
Performing vulnerability weaponization, exploit development, payload development, and exploit mitigation on a variety of challenging targets
Documenting, demonstrating, and presenting research
Solving real world problems that have an impact on national security

Qualification

Binary analysisDisassembly toolsC/C++PythonAssembly LanguagesReverse engineering fundamentalsVulnerability researchExploit developmentEmbedded systems analysisSoft skills

Required

Active Top Secret (TS) security clearance, for which U.S. citizenship is needed by the U.S. Government
Bachelors Degree in Computer Science, Computer Engineering, Cybersecurity or related field plus a minimum of 5 years relevant experience (MS or PhD with equivalent work experience may also be considered)
Experience with binary analysis of software/firmware
Experience with disassembly tools, such as IDA Pro, Binary Ninja, or Ghidra
Proficiency in one or more programming languages: C/C++, Python, etc
Proficiency in one or more Assembly Languages: x86, ARM, etc
General understanding of reverse engineering fundamentals: memory layout, calling conventions, etc

Preferred

Vulnerability research and analysis
Knowledge of weaponizing discovered vulnerabilities into exploits
Implant or software patch development
Familiarity with binary emulation or vulnerability research, including tools such as QEMU or AFL++
Experience with DSP architectures, such as Texas Instruments, STMicroelectronics, NXP, or Analog Devices
Knowledge of operating system internals including memory/process/thread management
Embedded systems or firmware analysis
Experience development custom emulation tools to enable dynamic analysis
Disassembler/decompiler module development
Experience analyzing and reconstructing code/data flow
Automated reverse engineering or software analysis tool development
Experience debugging software without source code
Knowledge of binary file structures and formats
Experience analyzing protocols or message structures
Knowledge of anti-reverse engineering techniques
Knowledge of intrusion detection and anti-malware systems and techniques

Company

STR

twittertwittertwitter
company-logo
STR is built on people & technology platforms tackling tough problems in cybersecurity, distributed sensing & artificial.

Funding

Current Stage
Late Stage

Leadership Team

leader-logo
Mark McClure
CTO and Executive VP
linkedin
leader-logo
James Wright
ACPSO/PERSEC Officer
linkedin
Company data provided by crunchbase