Senior Software Reverse Engineer jobs in United States
cer-icon
Apply on Employer Site
company-logo

STR · 1 month ago

Senior Software Reverse Engineer

STR is hiring a Senior Software Reverse Engineer who has a passion for research and analysis of vulnerabilities in cyber physical systems. The role involves reverse engineering complex software and firmware, developing automated tools for analysis, and working on innovative cybersecurity solutions.

AnalyticsHospitalityMarketplace
check
Work & Life Balance
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Reverse engineering complex software or firmware targets, ranging from typical Windows/Linux binaries to embedded firmware running non-traditional computer architectures and operating systems
Developing and applying automated reverse engineering and binary analysis tools to characterize protocols, interfaces, and functionality of target systems
Developing innovative cybersecurity solutions
Working in multi-discipline teams to tackle challenging problems from a wide variety of technologies to develop innovative cybersecurity solutions
Performing vulnerability weaponization, exploit development, payload development, and exploit mitigation on a variety of challenging targets
Documenting, demonstrating, and presenting research
Solving real world problems that have an impact on national security

Qualification

Reverse engineeringBinary analysisC/C++ programmingDisassembly toolsAssembly languagesVulnerability researchEmbedded systemsAutomated tool developmentSoft skills

Required

Active Top Secret (TS) security clearance, for which U.S. citizenship is needed by the U.S. Government
Bachelors Degree in Computer Science, Computer Engineering, Cybersecurity or related field plus a minimum of 5 years relevant experience (MS or PhD with equivalent work experience may also be considered)
Experience with binary analysis of software/firmware
Experience with disassembly tools, such as IDA Pro, Binary Ninja, or Ghidra
Proficiency in one or more programming languages: C/C++, Python, etc
Proficiency in one or more Assembly Languages: x86, ARM, etc
General understanding of reverse engineering fundamentals: memory layout, calling conventions, etc

Preferred

Vulnerability research and analysis
Knowledge of weaponizing discovered vulnerabilities into exploits
Implant or software patch development
Familiarity with binary emulation or vulnerability research, including tools such as QEMU or AFL++
Experience with DSP architectures, such as Texas Instruments, STMicroelectronics, NXP, or Analog Devices
Knowledge of operating system internals including memory/process/thread management
Embedded systems or firmware analysis
Experience development custom emulation tools to enable dynamic analysis
Disassembler/decompiler module development
Experience analyzing and reconstructing code/data flow
Automated reverse engineering or software analysis tool development
Experience debugging software without source code
Knowledge of binary file structures and formats
Experience analyzing protocols or message structures
Knowledge of anti-reverse engineering techniques
Knowledge of intrusion detection and anti-malware systems and techniques

Company

STR

twittertwittertwitter
company-logo
STR is the source for premium global data benchmarking, analytics and marketplace insights.

Funding

Current Stage
Late Stage
Total Funding
unknown
2019-10-01Acquired

Leadership Team

leader-logo
Alex Smith
VP
linkedin
leader-logo
Chad Church
VP
linkedin
Company data provided by crunchbase