Integrated Cyber Exploitation Researcher (Fort Meade, MD)

Date: May 27, 2023

Location: Ft Meade, MD, US

Company: MIT Lincoln Laboratory


The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop and prototype cutting-edge capabilities for our operational partners in the U.S. government. We look for, find, and demonstrate cyber vulnerabilities so that vulnerabilities in U.S. systems can be corrected, and so that vulnerabilities in other systems are better understood.  Top U.S. Government leadership relies on us for our expert guidance, and our technical role with our U.S. Government sponsors is considered essential to the success of their missions.


Position Description



Located onsite in Fort Meade, MD


From the MIT Lincoln Laboratory field office in Annapolis Junction, MD, you will be immersed in the missions of key government sponsors. We provide support across the full lifecycle of offensive cyber operations, from the reverse engineering and exploitation of software and hardware systems to providing technical subject matter expertise to operational planners. Your main areas of research will include cyber tool prototyping, technical analysis of offensive cyber tools, automated vulnerability discovery, reverse engineering, static analysis, and dynamic instrumentation. Once you’re on our team, you will communicate your research to non-domain experts through your writing, public presentations, and hand-on training sessions. Our field site positions in particular offer an opportunity to engage directly with our sponsors as trusted subject matter experts and shape key decisions in the defense of our nation.



  • PhD in Computer Science, Computer Engineering or related discipline or MS and 3+ years of directly related experience or BS and 7+ years of related experience
  • Selected candidate will be subject to a pre-employment background investigation and must possess a current Top-Secret SCI level DoD security clearance. Preference will be given to candidates with a completed full scope polygraph


Desired Technical Skills


Familiarity with all, Expertise in some:


  • Version Control Systems (Git)
  • Dissassemblers/Decompilers (Ghidra, IDAPro)
  • Debuggers (WinDbg, GDB) 
  • Programming Languages (C/C++, Python)
  • Infrastructure/Container Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker)
  • Network Protocol Analysis (Wireshark, Tcpdump)
  • Emulator/Virtualization Technologies (VMWare, QEMU)
  • Operating System Internals
  • Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More 
  • Vulnerability Assessment
  • Statistics and Metrics
  • SAT/SMT Solvers
  • Symbolic Execution
  • Data-flow Analysis for Compiled Binaries
  • Binary Intermediate Representations
  • Binary Translation
  • Compiler Construction
  • Anti-debugging/Anti-instrumentation Techniques
  • Network and Host Security Products


For Benefits Information, click

Selected candidate will be subject to a pre-employment background investigation and must be able to obtain and maintain a Secret level DoD security clearance.

To safeguard our health and well-being, MIT Lincoln Laboratory requires COVID-19 vaccination for all employees.  Individuals may request exemption from the vaccine requirement for medical or religious reason.

MIT Lincoln Laboratory is an Equal Employment Opportunity (EEO) employer. All qualified applicants will receive consideration for employment and will not be discriminated against on the basis of race, color, religion, sex, sexual orientation, gender identity, national origin, age, veteran status, disability status, or genetic information; U.S. citizenship is required.




Requisition ID: 33230 

Nearest Major Market: Baltimore
Nearest Secondary Market: Washington DC

Job Segment: Security Clearance, Computer Science, Cyber Security, Embedded, Laboratory, Government, Technology, Security, Science