Senior Vulnerability Researcher & Reverse Engineer at Parsons
West Melbourne, Florida, USA -
Full Time


Start Date

Immediate

Expiry Date

04 Dec, 25

Salary

190200.0

Posted On

05 Sep, 25

Experience

2 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Computer Science, Intelligence, Malware Analysis, Infrastructure, It, Computer Engineering, C, Security, Defense, Python, Software Development, C++, Consideration, Color, Platforms, Missions

Industry

Information Technology/IT

Description

In a world of possibilities, pursue one with endless opportunities. Imagine Next!
When it comes to what you want in your career, if you can imagine it, you can do it at Parsons. Imagine a career working with exceptional people sharing a common quest. Imagine a workplace where you can be yourself. Where you can thrive. Where you can find your next, right now. We’ve got what you’re looking for.

JOB DESCRIPTION:

Parsons is looking for an talented Senior Vulnerability Researcher/Reverse Engineer to join our team! In this role you will get to research hardware and software systems to find and exploit unique vulnerabilities (Zero Days).

WHAT REQUIRED SKILLS YOU’LL BRING:

  • Bachelor’s degree in Computer Science, Computer Engineering, or a related technical field
  • 8+ years of relevant work experience; additional 2 years of relevant experience in lieu of degree
  • Reverse engineering across various architectures and platforms; including x86/64, ARM, MIPS, RISC-V, etc.
  • Experience with disassemblers (IDA Pro, Binary Ninja, or Ghidra), common exploitation countermeasures (DEP, ASLR, etc.), & countermeasure defeats (ROP programming)
  • Experience researching operating system and applications to understand strengths and weaknesses in the design and implementation
  • Modeling of in-memory compiled application behavior
  • Ability to use a scripting language (Python, etc.)
  • Software development using C or C++

WHAT DESIRED SKILLS YOU’LL BRING:

  • Familiarity with modern and cutting edge exploitation techniques, tools, and methodologies
  • Experience with hypervisors
  • Malware analysis
  • Ability to analyze network protocols throughout all layers of the network stack
  • Software development for embedded/IOT systems

How To Apply:

Incase you would like to apply to this job directly from the source, please click here

Responsibilities
  • Reverse engineering systems and software executables using tools like Ghidra, Binary Ninja, or IDA Pro
  • Identifying potential software weaknesses/vulnerabilities
  • Proving vulnerabilities are exploitable by writing Proof of Concept (POC) exploits
  • Collaborating with and mentoring other VR/RE engineers working on the same target
  • Documenting RE/VR efforts in reports and other collaboration tools like Gitlab, Ghidra databases, or Confluence
  • Presenting findings to government customers and internal stakeholders.
Loading...