Reverse Engineer/Vulnerability Research Engineer


Education  Bachelor's degree with 4+ years' experience in Computer Science, Computer Engineering, Electrical Engineering or related field of study; Master's degree with 0-6 years' experience; or PhD with 0-2 years' experience, or equivalent experience.

Required Experience


  • Experience with vulnerability research

  • Develop software to run in user-mode or kernel-mode

  • Ability to code in C or C++

  • Ability to use a scripting language (Python, Perl, Ruby, etc.)

  • Experience with PC and embedded systems architecture to include boot processes and OS internals

  • Experience with a disassembler for reverse engineering (IDA Pro, BinaryNinja, etc.)

  • Understand network protocols

  • Experience with one or more assembly languages (x86, x64, ARM, MIPS, PowerPC, etc.)

  • Experience with one or more debuggers (WinDbg, OllyDbg, gdb, etc.)

  • Experience with reverse engineering one or more operating systems: Android, iOS, Windows, Linux, MacOS, VxWorks, QNX, RTOSs, or other custom operating systems

  • Ability to demonstrate good organization, communication, problem-solving, and teamwork skills

  • Knowledge of common mitigation techniques (DEP, ASLR, etc.)

  • Ability to analyze assembly-level code on multiple platforms (x86, x64, ARM, MIPS, PowerPC, etc.)

  • Ability to analyze network protocols throughout all layers of the network stack

Security  Top Secret Security Clearance is required. 




Email your resume to