
Reverse Engineer/Vulnerability Research Developer
RTX
full-time
Posted on:
Location Type: Office
Location: Columbia • Maryland • Virginia • United States
Visit company websiteExplore more
Salary
💰 $95,500 - $181,700 per year
About the role
- Analyze systems to understand how they work and what happens when they break
- Disassemble and analyze binary code
- Develop exploits, implants, payloads, and communication stacks based on extensive reverse engineering, vulnerability analysis, and software development
- Develop unique networking protocols and communication schemes
- Collaborate with cross-disciplinary teams to solve challenging problems and deliver actionable results
- Operationalize software through extensive testing, documentation, and integration with other systems
- Participate in laboratory and field tests to collect and analyze data, test new capabilities, and perform demonstrations
Requirements
- Bachelor's degree in computer science, computer engineering, electrical engineering, mathematics, or physics with 5+ years of experience or an advanced degree with 3+ years of experience
- Solid, creative programming skills using one or more of: C/C++ or Python
- Experience with some assembly language (x86/64, ARM, PPC, MIPS, etc.)
- Vulnerability research experience
- Reverse engineering skills using a tool such as IDA/Ghidra/BinaryNinja
- Understanding of network protocols (TCP/IP, wire-level protocols, BGP, RF communications, etc.)
- Active Top Secret security clearance
Benefits
- Parental (including paternal) leave
- Flexible work schedules
- Achievement awards
- Educational assistance
- Child/adult backup care
- Medical insurance
- Dental insurance
- Vision insurance
- Life insurance
- Short-term disability
- Long-term disability
- 401(k) match
- Flexible spending accounts
- Employee assistance program
- Employee Scholar Program
- Paid time off
- Holidays
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
CC++Pythonassembly languagevulnerability analysisreverse engineeringnetwork protocolsbinary code analysisexploit developmentcommunication protocols
Soft skills
collaborationproblem-solvingcreativitydocumentationdata analysis
Certifications
Top Secret security clearance