
Windows Vulnerability Researcher, Reverse Engineer
Legato, LLC
full-time
Posted on:
Location Type: Hybrid
Location: Dulles • Virginia • United States
Visit company websiteExplore more
Tech Stack
About the role
- Covers the full life cycle of Vulnerability Research from reverse engineering and emulation, through vulnerability discovery, to productization and effects generation
- Hardware debugging using JTAG/gdb
- Knowledge on typical embedded systems including UART, boot-up sequences, and updating devices
- Discovering vulnerabilities in firmware, device drivers, or proprietary embedded operating systems
- Repurposing vulnerabilities for specific effects
- Static and dynamic analysis, fuzzer development, malware analysis, and system emulation
- Working in small teams with close coordination with customers to enhance capabilities or resolve issues
Requirements
- Active TS/SCI clearance
- Familiarity with at least one common low-level architecture (x86, ARM, etc)
- Ability to conduct vulnerability research against applications compiled for that architecture
- Experience with software protection and binary armoring is a plus
- Familiarity with modern exploit mitigation techniques and counter-measures is a must
- Experience with Windows, Linux, iOS, or embedded platforms
- Development experience is desired; scripting experience is required
Benefits
- Health insurance
- 401(k) employer match with no vesting schedule
- 4 weeks paid time off including a week of sick leave
- 11 federal holidays off
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
vulnerability researchreverse engineeringhardware debuggingJTAGgdbstatic analysisdynamic analysisfuzzer developmentmalware analysisscripting
Soft Skills
team collaborationcustomer coordination
Certifications
TS/SCI clearance