Raytheon Technologies Senior Vulnerability Researcher - $10k Sign On Bonus in Annapolis, Maryland
Raytheon Technologies’ CODEX (Cyber Offense and Defense Experts) division brings together an elite team of mission-focused industry experts who are well known for their ability to overcome the most advanced technical challenges. The team comprises engineers of multiple disciplines including vulnerability research, reverse engineering, CNO/CNE development, hardware emulation, system engineering, and data analytics. Our engineers do more than just work with cutting-edge technology—they ensure the missions succeed for the customers! CODEX offices span the nation and offer its engineers the ability to advance their careers through mentorship, training, and an expansive technical portfolio that covers every side of cyber. If you want to be part of a collaborative team that supports challenging, meaningful work that is vital to our national security, apply today!
Use advanced systems to find zero-day (0-day) vulnerability. Responsible for analyzing, designing, and identifying programmatic behaviors. Have an opportunity to develop, test and debug software applications. Research data and provides new design ideas for vulnerability techniques. Understands terminologies like debugging and fuzzing and applying it into your work.
Bachelor of Science in Computer Science, Computer Engineering, Electrical Engineering or a related technical filed
8-10 years of practical experience in a technology-related environment.
Solid understanding of software development and knowledge in any of the following: C, C++ or Python
Experience with program analysis, reverse engineering, and debugging tools (e.g., angr, BAP, IDA Pro, Binary Ninja, gdb, Ghidra, windbg).
Knowledge of Window or Linux.
Knowledge of Assembly (x865/x64).
Understanding of OS Internals (any major OS)
Experience with exploit development or Hack The Box
Experience reading and writing assembly
Understanding of network protocols, application layer, be a le to read/write socket code
Understanding of exploit mitigations such as DEP and ASLR.
Experience using reverse engineering tools such as Ghidra, HexRays, or objdump.
Experience using debuggers such as gdb, WinDbg, OllyDbg.
Qualified applicants will be subject to a security investigation and must meet minimum requirements for access to classified information. U.S. Citizenship and current TS/SCI with a poly clearance is required.
Raytheon is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.