Raytheon Technologies Vulnerability Researacher in Annapolis, Maryland
Raytheon Technologies is a premier engineering company which provides technical solutions in software development and systems engineering that address security challenges and strengthen our customers. Raytheon hires industry-leading professionals, and we treat them like industry-leading professionals. We bring exceptional talent to an array of missions that includes computer network operations, vulnerabilities, characterization, information assurance, and emerging technologies to expand cybersecurity solutions. Raytheon Technologies engineers are developing advanced analytics helping transform analysis by making sense of the massive amounts of data that must be processed at break neck speed. Our Knowledge Management expertise includes utilizing semantic web technologies, storage, indexing, retrieval of structured/unstructured data, and social network analysis to extract and build graphic representations.
Vulnerability Researchers at Raytheon Technologies
analyze systems to understand how they work and how they behave when they break. Candidates must be able to actively debug software and troubleshoot issues with software crashes and programmatic flow and provide written reports, proof-of-concept code, prototypes, and hands-on demonstrations of reverse engineering and vulnerability analysis results.
All of our engineers write code, but many of our engineers spend as much time taking systems apart as building new ones. A typical day may involve studying disassembly or writing python to audit a piece of C++ code.
Experience programming in Assembly, C, C#, C++, Perl, or Python for a production environment.
Participate in reverse engineering and vulnerability research of hardware components, software applications, and operating systems to determine functionality, code structure, and circuit design for the use in the discovery of initial access capabilities.
Ability to perform source code analysis in an effort to discover software flaws, and provide/author documentation on the impact and severity of the flaw.
Participate in technical presentations on assigned projects.
Understanding of OS Internals (any major OS)
Experience reading or writing assembly (x86, x64, ARM, PPC, MIPS, SPARC, 68k, or others)
Experience developing embedded systems
Understanding of network protocols (TCP/IP stacks, wire-level protocols, RF communications, BGP, routing protocols, or others).
Understanding of exploit mitigations such as DEP and ASLR
Experience using reverse engineering tools such as IDA Pro, HexRays, or objdump
Experience using debuggers such as gdb, WinDbg, OllyDbg
Experience with modern C++ development, such as RAII, C++11 and C++14.
Qualified applicants may be subject to a security investigation and must meet minimum qualifications for access to classified information. U.S. Citizenship is required.
An Active TS/SCI with poly is required.
Raytheon is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.