Embedded Systems Reverse Engineer

Johns Hopkins Applied Physics Laboratory (APL) - Laurel, MD4.1

Full-timeEstimated: $110,000 - $150,000 a year
Are you passionate about making impactful technical contributions to critical national security cyber challenges?

Do you love researching the hardest cyber security problems and collaborating with outstanding software reverse engineers and developers to build jaw-dropping proof-of-concept capabilities?

Do you have experience crafting exploits on embedded systems?

If so, we're looking for someone like you to join our innovative team at APL!

We are seeking a creative engineer to find vulnerabilities in embedded systems before our adversaries do. We have world-class facilities uniquely tailored to analyzing communications systems, transportation systems, and critical infrastructure. We strive to foster an innovative and collaborative team environment where engineers can hack the latest technologies to understand how they work and how to break them.

As a member of our team, you will…

Exploit embedded systems
Join forces with APL team members to identify vulnerabilities or security weaknesses stemming from publicly disclosed vulnerabilities or previously unknown vulnerabilities
Build innovative and mission-aligned proof-of-principle capabilities and/or mitigations that can be deployed within operational constraints
Explore new techniques for automating embedded system software analysis and reverse engineering
Circulate knowledge by clearly articulating ideas through papers and presentations to team members, APL management, and government decision makers
We are looking for team members that have attained a degree in Computer Engineering, Computer Science, Electrical Engineering, or a related technical degree.

You meet our minimum qualifications for the job if you have...

Proficiency with software debuggers and static analysis tools (IDA Pro, Binary Ninja, Ghidra, etc.)
Expertise with one or more programming languages including C/C and Python
Familiarity with Unix/Linux operating systems and embedded systems development toolchains
Experience reading or writing assembly (x86/x64, Arm, PowerPC, MIPS, or others)
A Bachelor's degree with 4 or more years of relevant professional experience
A current DoD SECRET clearance
You'll go above and beyond our minimum requirements if you ...

Are an expert with advanced vulnerability discovery tools (e.g., symbolic execution)
Previously held dynamic technical leadership roles
Possess an active TS/SCI clearance with full scope polygraph
Why work at APL?

The Johns Hopkins University Applied Physics Laboratory (APL) brings world-class expertise to our nation's most critical defense, security, space and science challenges. With a wide selection of challenging, impactful work and a robust education assistance program, APL promotes a culture of life-long learning. Our employees enjoy generous benefits and healthy work/life balance. APL's campus is located in the Baltimore-Washington metro area. Learn more about our career opportunities atwww.jhuapl.edu/careers.

APL is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, sexual orientation, national origin, disability status, veteran status, or any other characteristic protected by applicable law.