Vulnerability Research Engineer Mid

The Challenge:

Are you looking for an opportunity to work in an R&D lab researching and analyzing security vulnerabilities associated with a wide variety of architectures for the U.S. Army? Do you have experience with C, C++ programming and some understanding of assembly language in one or more Instruction Set Architectures (ISA) and hardware platforms, as well as reverse engineering tools, including Ida Pro and the use of fuzzing techniques and tools?

As a software vulnerability researcher on our team, you’ll learn how to help customers overcome their most difficult challenges with a wide variety of architectures, including x86, MIPS, and ARM with an emphasis on embedded software applications and Real Time OS (RTOS). You’ll also have the opportunity to use open source frameworks and reverse engineering tools like Ida Pro. You’ll directly impact the DoD by conducting in depth assessments to find zero day vulnerabilities. With mentoring, positive reviews, and opportunities to learn new tools and skills, we focus on growing as a team to make the best solutions for our customers. The successful candidate will assume a research role as part of a team discovering vulnerabilities within identified applications and hardware. You will also collaborate in identifying potential software patches in the analysis of potential exploits against discovered vulnerabilities. Join us as we build systems to change the U.S. Army for the better.

Empower change with us.

You Have:

-Experience with software reverse engineering tools, including Ida Pro Hopper, x64, or Ghidra

-Experience with Radamsa, Libfuzzer, American Fuzzy LOP, Defensics Hongguzz, or OSS-fuzz

-Experience with C and C++

-Experience with debuggers, compilers, assemblers, linkers, source code extractors, and disassemblers for Windows, Linux, Android, Apple OS X, or IOS platforms

-Experience with emulation, including QEMU or code intermediate representation (IR)

-Knowledge of dynamic, concrete, symbolic, and concolic software analysis

-Knowledge of assembly languages

 -Top Secret clearance

-BA or BS degree 

Nice If You Have:

-Experience with cyber

-Experience with electronic warfare

-Experience with Assembly

-Knowledge of IP protocols

-TS/SCI clearance

-BA or BS degree in Computer Engineer, Computer Science, or Electrical Engineering

Clearance: 

Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; Top Secret clearance is required.

Build Your Career:

A challenging and dynamic work environment isn’t all we have to offer. When you join Booz Allen, you’ll have access to:

  • experts in virtually every field

  • a culture that focuses on supporting our employees

  • opportunities that provide stability while offering variety

You’ll also be exposed to a wealth of training resources through our Digital University, an online learning portal featuring more than 5000 functional and technical courses, certifications, and books. Build your technical skills through hands-on training on the latest tools and tech from our in-house experts. Pursuing certifications that directly impact your role? You may be able to take advantage of our tuition assistance, on-site bootcamps, certification training, academic programs, vendor relationships, and a network of professionals who can give you helpful tips. We’ll help you develop the career you want as you chart your own course for success.

We’re an EOE that empowers our people—no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, veteran status, or other protected characteristic—to fearlessly drive change.

APC4

Not ready to apply? Join our talent community and sign up for job alerts.