Raytheon Technologies' CODEX (Cyber Offense and Defense EXperts) division brings together an elite team of mission-focused industry experts who are well known for their ability to overcome the most advanced technical challenges. The team comprises engineers of multiple disciplines including vulnerability research, reverse engineering, CNO/CNE development, hardware emulation, system engineering, data analytics and test engineering.
Here at CODEX, we are passionate about technical excellence and innovation. That's why we only take on work that is hard, engaging and meaningful. We foster an environment where pushing the limits of our technical ability is the norm. Occasional failure does not deter us. True innovation comes from trying new things and seeing what works. We strive to create a relaxed culture with an unmatched rate of mission results.
In addition to competitive salaries, CODEX offers excellent benefits for you and your family: competitive medical, dental and vision plans, child, elderly and dependent-care programs, mental health resources, tuition assistance, employee discount programs, 401k matching, flexible work schedules (depending on program), a peer recognition and reward system and performance-based bonuses.
Our team covers the full life cycle from emulation, reverse engineering, vulnerability research, and CNO/CNE tool development. Our mission covers a wide range of targets, anything from major consumer electronics to proprietary one-off systems. If it runs code, we have probably looked at it (or will soon.). In addition, the position will provide deliverables for real-world use in relatively short turn-around times.
We seek a qualified engineer that can perform as a Principal Investigator on activities involved with research tools and Internal Research and Development. Projects will be undertaken in small teams with close coordination with customers to quickly enhance capabilities or resolve issues in existing tools for real-world applications. Working as part of a team you will also need to be familiar with source management tools such as GIT and team coordination tools like the Atlassian suite of work products. All candidates must be US citizens and be able to obtain and maintain a government security clearance.
Required some combination skills below:
Leadership and organizational abilities to plan and track program milestones
Mentoring skills to enable IRAD staff to execute on technical tasks
Ability to keep up with state of the art in academia for the topics IRAD covers (see below)
Strong experience in reverse engineering and vulnerability research and familiarity with popular tools such as Ghidra, IDA, plugin development, etc.
Comfortable with overall machine learning and artificial intelligence concepts
Up to date with the latest and greatest effective ML techniques (such as RNN)
Comfortable with the idea of building a ML pipeline within a continuous integration model
Familiarity with Spark toolset for ML training/pipeline
Experience with binary reverse engineering across architectures/platforms and related tools such as BinDiff and DeepBinDiff
Understanding of common vulnerability patterns and exploitation of them
Functional background in static analysis, symbolic analysis, concolic analysis, and dynamic analysis and experience with corresponding state of the art tools available
Understanding of virtualization and emulation of both machine code and intermediate representations (such as p-code)
Understanding of fuzzing and advanced fuzzing modes including feedback-driven fuzzing, directed fuzzing, and stuck state resolution
Strong experience with C
Working knowledge of code coverage and dataflow trace capture within dynamic analysis toolsets
Vulnerability research experience with one or more chipset/OS type
Experience with debugging tools (WinDbg, gdb, lldb, OllyDbg)
Experience developing CNO/CNE tools
Experience with source management tools
Experience with assembly language (x86/64, ARM, PPC, Mips, etc.)
Understanding of network protocols (TCP/IP stacks, wire-level protocols, RF communications, BGP, routing protocols, or others)
Knowledge of typical embedded systems including UART, boot-up sequences and updating devices
Embedded system development and/or hardware debugging using JTAG/gdb
Hardware/full system emulation
Hardware/firmware/communications reverse engineering
Linux or other OS reversing
Bachelor's degree or equivalent experience
Qualified applicants may be subject to a security investigation and must meet minimum qualifications for access to classified information. U.S. Citizenship required.
Raytheon is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, sex, sexual orientation, gender orientation, gender identity, national origin, disability, or protected Veteran status.