Lead, Security Research Engineer at L3Harris Technologies
Ottawa, ON, Canada -
Full Time


Start Date

Immediate

Expiry Date

06 Jul, 25

Salary

0.0

Posted On

06 Apr, 25

Experience

7 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Programming Languages, Security Research, Linux, Vulnerability Research, Powerpc, Rop, Python, Vulnerability, Windows, Intelligence Community, Android, Windbg, Swift, Cyber Operations

Industry

Information Technology/IT

Description

L3Harris is dedicated to recruiting and developing high-performing talent who are passionate about what they do. Our employees are unified in a shared dedication to our customers’ mission and quest for professional growth. L3Harris provides an inclusive, engaging environment designed to empower employees and promote work-life success. Fundamental to our culture is an unwavering focus on values, dedication to our communities, and commitment to excellence in everything we do.
L3Harris Technologies is the Trusted Disruptor in the defense industry. With customers’ mission-critical needs always in mind, our employees deliver end-to-end technology solutions connecting the space, air, land, sea and cyber domains in the interest of national security.

JOB DESCRIPTION:

  • Finding vulnerabilities in ubiquitous Internet-deployed software and/or popular devices’ software or firmware
  • Constructing exploits for vulnerabilities discovered by you or other research staff
  • Research & development on security technologies in such fields as exploitation, bug-finding, reverse engineering and static analysis
  • Working with and for officers, employees or contractors of the company
  • Regular interaction with managers to field queries and questions
  • Take an active role in cross-team projects when needed

QUALIFICATIONS:

  • Bachelor’s Degree and minimum 9 years of prior relevant experience. Graduate Degree and a minimum of 7 years of prior related experience. In lieu of a degree, minimum of 13 years of prior related experience

PREFERRED ADDITIONAL SKILLS:

  • Experience performing vulnerability research and/or exploit development.
  • Experience with static and dynamic binary analysis.
  • Experience with iOS, Android, Windows, Linux, or embedded systems kernel, user land, and internals or browser internals.
  • Experience with common tools in security research (e.g. IdaPro, Ghidra, Radare, Binary Ninja, AFL, SysInternals, GDB, WinDBG, etc).
  • Experience with common programming languages (e.g. C/C++, Python, Swift, etc).
  • Experience with common architectures (e.g. x86/64, ARM, AARCH64, MIPS, PowerPC, TILEGX, etc).
  • Experience with modern security system features, exploit mitigations, and evasion techniques (e.g. defeating ASLR, DEP, Control Flow Guard, ROP, Security Product/AV Evasion, etc).
  • Experience with a wide range of modern exploitation concepts and techniques
  • Service in the US/CA/UK/AU/NZ Intelligence Community or US/CA/UK/AU/NZ Military working in cyber operations.
  • Evidence of a successful track record in vulnerability research through CVEs.
  • Experience teaching and mentoring junior vulnerability researchers.
Responsibilities

Please refer the Job description for details

Loading...