Raytheon Technologies Sr. Principal Vulnerability Researcher - AL in Huntsville, Alabama
Raytheon Technologies’ CODEX (Cyber Offense and Defense Experts) division brings together an elite team of mission-focused industry experts who are well known for their ability to overcome the most advanced technical challenges. The team comprises engineers of multiple disciplines including vulnerability research, reverse engineering, CNO/CNE development, hardware emulation, system engineering, and data analytics. Our engineers do more than just work with cutting-edge technology—they ensure the missions succeed for the customers! CODEX offices span the nation and offer its engineers the ability to advance their careers through mentorship, training, and an expansive technical portfolio that covers every side of cyber. If you want to be part of a collaborative team that supports challenging, meaningful work that is vital to our national security, apply today!
Vulnerability researchers at Raytheon CODEX analyze systems to understand how they work and how they behave when they break. Candidates must be able to play both sides of the fence, both developing and defeating new and advanced security techniques. Projects are undertaken in small teams with close coordination with customers. All our engineers write code, but many of our engineers spend as much time taking systems apart as building new ones. A typical day can involve studying disassembly or writing Python to audit a piece of C++ code.
8+ years of professional experience
Experience with C or C+
- 3 or more of the following desired skills
Understanding of OS Internals (any major OS)
Experience with Vulnerability Research
Experience reading or writing assembly (x86, x64, ARM, PPC, MIPS, SPARC, 68k, or others)
Experience developing embedded systems
Understanding of network protocols (TCP/IP stacks, wire-level protocols, RF communications, BGP, routing protocols, or others).
Understanding of exploit mitigations such as DEP and ASLR
Experience using reverse engineering tools such as IDA Pro, HexRays, Ghidra, Binary Ninja, or objdump.
Experience using debuggers such as gdb, WinDbg, OllyDbg
Experience with BDI/JTAG
Experience with modern C++ development, such as RAII, C++11 and C++14.
Experience building and using tools to find, exploit, and productize vulnerabilities in complex software systems
Security Clearance :
Qualified applicants may be subject to a security investigation and must meet minimum qualifications for access to classified information. U.S. Citizenship is required. An active Secret clearance required . Qualified applicants must meet the requirements to obtain and maintain a government security clearance 178426
Raytheon is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.