Cyber System Exploitation Specialist (Remote)
Date: Mar 18, 2023
Location: Lexington, MA, US
Company: MIT Lincoln Laboratory
The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop and prototype cutting-edge capabilities for our operational partners in the U.S. government. We look for, find, and demonstrate cyber vulnerabilities so that vulnerabilities in U.S. systems can be corrected, and so that vulnerabilities in other systems are better understood. Top U.S. Government leadership relies on us for our expert guidance, and our technical role with our U.S. Government sponsors is considered essential to the success of their missions.
Position Description
As a Cyber System Exploitation Specialist, you'll be reverse engineering and exploiting software and hardware systems important to the U.S government operations and critical to the defense of our nation. Your main tasks will include cyber tool prototyping, automated vulnerability discovery, reverse engineering, software protection mechanisms, static analysis, and dynamic instrumentation. You will communicate your work to domain and non-domain experts through your writing, presentations, and training sessions. This position is fully remote, but with the expectation that you will travel to the lab or sponsor sites several times per year to collaborate with staff and transition work to sponsors.
Requirements
- BS in Computer Science, Computer Engineering, Computer Security or related discipline or an unrelated bachelor's degree and at least 3 years of directly related experience
- Selected candidate will be subject to a pre-employment background investigation and must be able to obtain and maintain a Secret level DoD security clearance
Desired Technical Skills (Some use, including in classwork, of many of these technologies):
- Version Control Systems (Git)
- Dissassemblers/Decompilers (Ghidra, IDAPro)
- Debuggers (WinDbg, GDB)
- Programming Languages (C/C++, Python)
- Infrastructure/Container Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker)
- Network Protocol Analysis (Wireshark, Tcpdump)
- Emulator/Virtualization Technologies (VMWare, QEMU)
- Operating System Internals
- Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment
- Statistics and Metrics
- SAT/SMT Solvers
- Symbolic Execution
- Data-flow Analysis for Compiled Binaries
- Binary Intermediate Representations
- Binary Translation
- Compiler Construction
- Anti-debugging/Anti-instrumentation Techniques
- Network and Host Security Products
- Vulnerability Assessment
For Benefits Information, click http://hrweb.mit.edu/benefits
Selected candidate will be subject to a pre-employment background investigation and must be able to obtain and maintain a Secret level DoD security clearance.
To safeguard our health and well-being, MIT Lincoln Laboratory requires COVID-19 vaccination for all employees. Individuals may request exemption from the vaccine requirement for medical or religious reason.
MIT Lincoln Laboratory is an Equal Employment Opportunity (EEO) employer. All qualified applicants will receive consideration for employment and will not be discriminated against on the basis of race, color, religion, sex, sexual orientation, gender identity, national origin, age, veteran status, disability status, or genetic information; U.S. citizenship is required.
Requisition ID: 37116
Nearest Major Market: Boston
Job Segment:
Embedded, Security Clearance, Cyber Security, Computer Science, Instrumentation, Technology, Government, Security, Engineering