Raytheon Veterans Jobs

Job Information

Raytheon Technologies IRAD Principal Investigator in St. Petersburg, Florida


Raytheon Technologies’ CODEX (Cyber Offense and Defense EXperts) division brings together an elite team of mission-focused industry experts who are well known for their ability to overcome the most advanced technical challenges. The team comprises engineers of multiple disciplines including vulnerability research, reverse engineering, CNO/CNE development, hardware emulation, system engineering, data analytics and test engineering.

CODEX Culture

Here at CODEX, we are passionate about technical excellence and innovation. That’s why we only take on work that is hard, engaging and meaningful. We foster an environment where pushing the limits of our technical ability is the norm. Occasional failure does not deter us. True innovation comes from trying new things and seeing what works. We strive to create a relaxed culture with an unmatched rate of mission results.


In addition to competitive salaries, CODEX offers excellent benefits for you and your family: competitive medical, dental and vision plans, child, elderly and dependent-care programs, mental health resources, tuition assistance, employee discount programs, 401k matching, flexible work schedules (depending on program), a peer recognition and reward system and performance-based bonuses.

Position Details:

Our team covers the full life cycle from emulation, reverse engineering, vulnerability research, and CNO/CNE tool development. Our mission covers a wide range of targets, anything from major consumer electronics to proprietary one-off systems. If it runs code, we have probably looked at it (or will soon.). In addition, the position will provide deliverables for real-world use in relatively short turn-around times.

We seek a qualified engineer that can perform as a Principal Investigator on activities involved with research tools and Internal Research and Development. Projects will be undertaken in small teams with close coordination with customers to quickly enhance capabilities or resolve issues in existing tools for real-world applications. Working as part of a team you will also need to be familiar with source management tools such as GIT and team coordination tools like the Atlassian suite of work products. All candidates must be US citizens and be able to obtain and maintain a government security clearance.

Required some combination skills below:

  • Leadership and organizational abilities to plan and track program milestones

  • Mentoring skills to enable IRAD staff to execute on technical tasks

  • Ability to keep up with state of the art in academia for the topics IRAD covers (see below)

  • Strong experience in reverse engineering and vulnerability research and familiarity with popular tools such as Ghidra, IDA, plugin development, etc.

  • Comfortable with overall machine learning and artificial intelligence concepts

  • Up to date with the latest and greatest effective ML techniques (such as RNN)

  • Comfortable with the idea of building a ML pipeline within a continuous integration model

  • Familiarity with Spark toolset for ML training/pipeline

  • Experience with binary reverse engineering across architectures/platforms and related tools such as BinDiff and DeepBinDiff

  • Understanding of common vulnerability patterns and exploitation of them

  • Functional background in static analysis, symbolic analysis, concolic analysis, and dynamic analysis and experience with corresponding state of the art tools available

  • Understanding of virtualization and emulation of both machine code and intermediate representations (such as p-code)

  • Understanding of fuzzing and advanced fuzzing modes including feedback-driven fuzzing, directed fuzzing, and stuck state resolution

  • Strong experience with C

    Desired Skills

  • C++/Python

  • Working knowledge of code coverage and dataflow trace capture within dynamic analysis toolsets

  • Vulnerability research experience with one or more chipset/OS type

  • Experience with debugging tools (WinDbg, gdb, lldb, OllyDbg)

  • Experience developing CNO/CNE tools

  • Experience with source management tools

  • Experience with assembly language (x86/64, ARM, PPC, Mips, etc.)

  • Embedded/RTOS systems

  • Understanding of network protocols (TCP/IP stacks, wire-level protocols, RF communications, BGP, routing protocols, or others)

  • Knowledge of typical embedded systems including UART, boot-up sequences and updating devices

  • Embedded system development and/or hardware debugging using JTAG/gdb

  • Hardware/full system emulation

  • Hardware/firmware/communications reverse engineering

  • Linux or other OS reversing


Bachelor’s degree or equivalent experience

Clearance Required:

Qualified applicants may be subject to a security investigation and must meet minimum qualifications for access to classified information. U.S. Citizenship required.



Raytheon is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.