BTS · 3 months ago
Vulnerability Researcher II
BTS Software Solutions is seeking a Vulnerability Researcher II to join their team. The role involves debugging software, performing source code analysis, developing proof-of-concept exploits, and leading vulnerability research efforts.
Defense & Space
Responsibilities
Actively debug software and troubleshoot issues with software crashes and programmatic flow
Ability to perform source code analysis in an effort to discover software flaws, and provide/author documentation on the impact and severity of the flaw
Ability to develop proof-of-concept exploits against research targets, prototypes, and hands-on demonstrations of vulnerability analysis results
Provide/author and participate in technical presentations on assigned projects
Lead reverse engineering and vulnerability research
Qualification
Required
Active TS/SCI w/ POLY
Experience programming in Assembly, C, C#, C++, Perl, or Python with a focus on an understanding of system interactions with these libraries vs. production-style environments
Use of Unix/Windows system API's
Understanding of virtual function tables in C++
Heap allocation strategies and protections
Minimum four (4) years of experience programming in Assembly, C, C#, C++, Perl, or Python for a production environment
Minimum of five (5) years contiguous experience in computer science, information systems, or network engineering; or Bachelor's Degree in Computer Science or related field plus a minimum of three (3) years contiguous experience
Minimum four (4) years of demonstrated experience in either hardware or software reverse engineering
Preferred
Experience with very large software projects
Kernel programming experience (WDK / Unix||Linux) a significant plus
Hardware/Software reverse engineering, which often includes the use of tools (e.g., IDA Pro, Ghidra, Binary Ninja) to identify abstract concepts about the code flow of an application
For Hardware reverse engineering, candidates are expected to have performed analysis of embedded devices, focusing primarily on identifying the software stack and points of entry to the hardware
Candidates who can merge low-level knowledge about compilation of C/C++ code with a nuanced understanding of system design to identify and exploit common vulnerability patterns
Candidates should be comfortable with, at a minimum, user-mode stack-based buffer overflows, and heap-based exploitation strategies
Benefits
100% Company PAID health benefits
PTO
401K matching and vested from day one of employment