Date Posted:
2023-06-23Country:
United States of AmericaLocation:
MD230: 300 Sentinel Drive Suite300 AJ 300 Sentinel Drive Suite 300, Annapolis Junction, MD, 20701 USAPosition Role Type:
UnspecifiedRaytheon is a premier engineering company that provides technical solutions in software development and systems engineering that address security challenges. Raytheon hires industry-leading cyber professionals, and we treat them like industry-leading cyber professionals. We bring exceptional talent to an array of missions that includes computer network operations, vulnerabilities, characterization, information assurance, and emerging technologies to expand cybersecurity solutions. Raytheon engineers are developing advanced analytics helping transform analysis by making sense of the massive amounts of data that must be processed quickly to respond to evolving mission needs.
Position Description:
Vulnerability researchers at Raytheon CODEX analyze systems to understand how they work and how they behave when they break. Candidates must be able to play both sides of the fence, both developing and defeating new and advanced security techniques. Projects are undertaken in small teams with close coordination with customers. All our engineers write code, but many of our engineers spend as much time taking systems apart as building new ones. A typical day can involve studying disassembly or writing Python to audit a piece of C++ code.
Information security continues to be a growth industry. We are constantly looking to find the right candidates who can do this challenging work.
Required Skills:
Experience with C or C++
4+ years of professional experience
3 or more of the "desired skills" below
Desired Skills:
Understanding of OS Internals (any major OS)
Experience with Vulnerability Research
Experience reading or writing assembly (x86, x64, ARM, PPC, MIPS, SPARC, 68k, or others)
Experience developing embedded systems
Understanding of network protocols (TCP/IP stacks, wire-level protocols, RF communications, BGP, routing protocols, or others).
Understanding of exploit mitigations such as DEP and ASLR
Experience using reverse engineering tools such as IDA Pro, HexRays, Ghidra, Binary Ninja, or objdump.
Experience using debuggers such as gdb, WinDbg, OllyDbg
Experience with BDI/JTAG
Experience with modern C++ development, such as RAII, C++11 and C++14.
Experience building and using tools to find, exploit, and productize vulnerabilities in complex software systems
Security Clearance:
Qualified applicants may be subject to a security investigation and must meet minimum qualifications for access to classified information. U.S. Citizenship is required. An active TS/SCI W/Poly clearance required. Qualified applicants must meet the requirements to obtain and maintain a government security clearance.
Requires advanced knowledge of work area typically obtained through advanced education combined with experience. May have practical knowledge of project
management. Practical to substantial knowledge of RTX projects, programs or systems with the ability to make enhancements and leverage in daily work.
Typically requires:
A University Degree or equivalent experience and minimum 5 years prior relevant experience, or An Advanced Degree in a related field and minimum 3 years experience
Engineering/Other Technical Positions:
Typically requires a degree in Science, Technology, Engineering or Mathematics (STEM) and a minimum of 5 years of prior relevant experience unless prohibited by local laws/regulations.
This requisition is eligible for an employee referral award. ALL eligibility requirements must be met to receive the referral award.
RTX is An Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age or any other federally protected class.
Privacy Policy and Terms:
Click on this link to read the Policy and Terms