Junior Offensive Cyber Security Researcher - Cambridge, United States - The Charles Stark Draper Laboratory Inc

Mark Lane

Posted by:

Mark Lane

beBee recruiter


Description

Overview:

Equal Employment Opportunity


Draper is committed to creating a diverse environment and is proud to be an affirmative action and equal opportunity employer.

We understand the value of diversity and its impact on a high-performance culture.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, disability, age, sexual orientation, gender identity, national origin, veteran status, or genetic information.


Responsibilities:


Qualifications:


Within the Offensive Cyber Security group we acknowledge that many people in the field may have non-traditional educational paths and we want to encourage all potential applicants to apply.

Applicants should satisfy at least two or more of the following:

  • Approximately 1 year plus of job or personal experience in the field, with work related directly to Reverse Engineering and/or Vulnerability Research.
  • A degree in Computer Science, Computer Engineering, or related discipline.
  • Familiarity with common types of software and/or hardware vulnerabilities and exploits.
  • Fluency and experience developing tools in one of the following preferred programming languages:
  • Assembly, C, C++, Python, Rust, OCaml
  • Familiarity and experience with binary disassembler/decompiler tools.

Preferred Qualifications:


The Offensive Cyber Security group strives to ensure that we all continually improve our technical and personal skillsets to ensure that we remain at the forefront of novel research and development.

As such we strongly believe that having a healthy and positive team environment is essential for encouraging individual and team growth.


  • Personable, friendly, and willingness to engage with peers.
  • Enthusiastic about personal and groupbased technical growth.
  • Ability to communicate clearly and concisely with others to aid in knowledge transfer.


Due to the interdisciplinary aspects of the position the applicants are not expected to have familiarity with all of the following desired skills but familiarity with
_at least one or more _of the following topics, tools, or techniques will be beneficial to accelerating the process.


General:


  • Familiarity with one or more hardware or hypervisor architectures:
  • x86, x86_64, ARM, RISC-V, VT-x, SVM
  • Familiarity with one or more operating system internals:
  • Windows, GNU/Linux, QNX, RTOS
  • Understanding of Network Technologies
  • TCP/IP and UDP datagrams
  • Knowledge of the OSI model
  • Deep Packet Capture and Analysis

Software Domain:


  • Usermode and kernelmode debuggers.
  • Experience with static and dynamic program analysis for binary and/or network domains.
  • Knowledge of compiler internals and passes.

Embedded Domain:


  • Discovery and usage of debug interfaces with target devices via JTAG/SWD/BDM.
  • Custom filesystem extraction and modification, removal and/or regeneration of OOB/CRC data.
  • Bus and protocol analysis / reverse engineering.

Hardware Domain:

- eMMC/NAND/SPI flash data extraction and flashing.

  • Competent electronic skills (soldering and incircuit debugging).
  • Side channel attack (glitching) experience to place components and/or devices into altered states to bypass protection.

Security Requirement:


  • Applicants selected for this position will be required to obtain and maintain a government security clearance.

More jobs from The Charles Stark Draper Laboratory Inc