JobsEQ by Chmura Logo

Prin Eng, Cyber Engrg

Raytheon

Location: Tampa, Florida
Type: Full-Time, Non-Remote
Posted on: September 23, 2021
This job is no longer available from the source.
Requisition ID 188401BR
Posting Title Vulnerability Researcher
Work Location FL - Tampa
Requisition ID 188401BR
Job Description CODEX
Raytheon Technologies’ CODEX (Cyber Offense and Defense EXperts) division brings together an elite team of mission-focused industry experts who are well known for their ability to overcome the most advanced technical challenges. The team comprises engineers of multiple disciplines including vulnerability research, reverse engineering, CNO/CNE development, hardware emulation, system engineering, data analytics and test engineering.
CODEX Culture
Here at CODEX, we are passionate about technical excellence and innovation.  That’s why we only take on work that is hard, engaging and meaningful.  We foster an environment where pushing the limits of our technical ability is the norm. Occasional failure does not deter us.  True innovation comes from trying new things and seeing what works.  We strive to create a relaxed culture with an unmatched rate of mission results.
Benefits
In addition to competitive salaries, CODEX offers excellent benefits for you and your family: competitive medical, dental and vision plans, child, elderly and dependent-care programs, mental health resources, tuition assistance, employee discount programs, 401k matching, flexible work schedules (depending on program), a peer recognition and reward system and performance-based bonuses.
Position Details:
Our team covers the full life cycle from emulation, reverse engineering, vulnerability research, and CNO/CNE tool development.  Our mission covers a wide range of targets, anything from major consumer electronics to proprietary one-off systems.  If it runs code, we have probably looked at it (or will soon.). In addition, the position will provide deliverables for real-world use in relatively short turn-around times.
We seek a qualified engineer that can perform as a Principal Investigator on activities involved with research tools and Internal Research and Development. Projects will be undertaken in small teams with close coordination with customers to quickly enhance capabilities or resolve issues in existing tools for real-world applications.  Working as part of a team you will also need to be familiar with source management tools such as GIT and team coordination tools like the Atlassian suite of work products.  All candidates must be US citizens and be able to obtain and maintain a government security clearance.
Required some combination skills below:
• Leadership and organizational abilities to plan and track program milestones
• Mentoring skills to enable IRAD staff to execute on technical tasks
• Ability to keep up with state of the art in academia for the topics IRAD covers (see below)
• Strong experience in reverse engineering and vulnerability research and familiarity with popular tools such as Ghidra, IDA, plugin development, etc.
• Comfortable with overall machine learning and artificial intelligence concepts
• Up to date with the latest and greatest effective ML techniques (such as RNN)
• Comfortable with the idea of building a ML pipeline within a continuous integration model
• Familiarity with Spark toolset for ML training/pipeline
• Experience with binary reverse engineering across architectures/platforms and related tools such as BinDiff and DeepBinDiff
• Understanding of common vulnerability patterns and exploitation of them
• Functional background in static analysis, symbolic analysis, concolic analysis, and dynamic analysis and experience with corresponding state of the art tools available
• Understanding of virtualization and emulation of both machine code and intermediate representations (such as p-code)
• Understanding of fuzzing and advanced fuzzing modes including feedback-driven fuzzing, directed fuzzing, and stuck state resolution
• Strong experience with C
Desired Skills • C++/Python
• Working knowledge of code coverage and dataflow trace capture within dynamic analysis toolsets
• Vulnerability research experience with one or more chipset/OS type
• Experience with debugging tools (WinDbg, gdb, lldb, OllyDbg)
• Experience developing CNO/CNE tools
• Experience with source management tools
• Experience with assembly language (x86/64, ARM, PPC, Mips, etc.)
• Embedded/RTOS systems
• Understanding of network protocols (TCP/IP stacks, wire-level protocols, RF communications, BGP, routing protocols, or others)
• Knowledge of typical embedded systems including UART, boot-up sequences and updating devices
• Embedded system development and/or hardware debugging using JTAG/gdb
• Hardware/full system emulation
• Hardware/firmware/communications reverse engineering
• Linux or other OS reversing
Education:
Bachelor’s degree or equivalent experience
Clearance Required:
Qualified applicants may be subject to a security investigation and must meet minimum qualifications for access to classified information. U.S. Citizenship required.
Required
Business Unit Profile Raytheon Intelligence & Space delivers the disruptive technologies our customers need to succeed in any domain, against any challenge. A developer of advanced sensors, training, and cyber and software solutions, Raytheon Intelligence & Space provides a decisive advantage to civil, military and commercial customers in more than 40 countries around the world. Headquartered in Arlington, Virginia, the business generated $15 billion in pro forma annual revenue in 2019 and has 39,000 employees worldwide. Raytheon Intelligence & Space is one of four businesses that form Raytheon Technologies Corporation.
Business Intelligence, Information&Svcs
Relocation Eligible Yes
Talent Area Computer Science, Cyber Jobs
Type Of Job Full Time
Job Function Engineering
Ability to Telecommute Part time telecommuting
Clearance Type Top Secret
U.S. FLSA Classification Exempt
COVID-19 Vaccination Terms and Conditions COVID-19 continues to significantly impact our communities, families and employees. With employee health and safety as our top priority, Raytheon Technologies is taking action to address the increased risk and uncertainty COVID variants pose in the workplace. Effective November 15, 2021, we will require all newly hired employees to be fully vaccinated before their start date.
Any offer from Raytheon Technologies is contingent on you being fully vaccinated against COVID-19 prior to starting your employment.
If you are an external hire, where permitted by applicable law, you must be fully vaccinated prior to starting your employment regardless of work location. Fully vaccinated means two weeks have passed since a single-shot vaccine or the second dose of a two-shot vaccine. Once the FDA requirements are defined for COVID-19 vaccine booster shots, employees will be required to obtain the shots at the recommended interval to satisfy the fully vaccinated requirement. Medical and Religious exceptions will be given on an exception basis and must be supported by a letter from a doctor or religious leader.
Equal Opportunity/Affirmative Action Employer Raytheon Technologies is An Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age or any other federally protected class.