Description:Reverse Engineer / Vulnerability ResearcherWhat We’re Doing:Lockheed Martin, Cyber & Intelligence invites you to step up to one of today’s most daunting challenges: the evolving threat of cyber warfare. As a Reverse Engineer / Vulnerability Researcher professional at Lockheed Martin, you

Reverse Engineer / Vulnerability Researcher

Lockheed Martin • 
Hanover, Maryland, United States
Position Type: Permanent
Job Description:

Description:Reverse Engineer / Vulnerability Researcher


What We’re Doing:
Lockheed Martin, Cyber & Intelligence invites you to step up to one of today’s most daunting challenges: the evolving threat of cyber warfare. As a Reverse Engineer / Vulnerability Researcher professional at Lockheed Martin, you’ll protect the networks that our citizens and the world depend upon each minute. Here, you’ll work with cybersecurity experts on the forefront of threat protection and proactive prevention. In this fast-paced, real-world environment, you’ll draw on all your education and experience as well as the resources of Lockheed Martin to keep the threats at bay.

Do you want to lead the way in processes, techniques, tools, tactics, and technology supporting Offensive Cyber Operations?

Are you skilled in Reverse Engineering or Vulnerability Research?

We need strong contributors who are interested in;

1. Creating an exemplar environment for research and reverse environment.
2. Automating RE tools and processes
3. Communicating results

If that sounds like you, come join our team!

Why Join Us:
Your Health, Your Wealth, Your Life
Our flexible schedules, competitive pay and comprehensive benefits enable you to live a healthy, fulfilling life at and outside of work.
Learn more about Lockheed Martin’s competitive and comprehensive benefits package.
Basic Qualifications:
Bachelors degree from an accredited college in a related discipline, or equivalent experience/combined education, with 9 years of professional experience; or 7 years of professional experience with a related Masters degree. Considered an emerging authority.
Desired Skills:
• Interest in Offensive Cyber and/or hacking demonstrated through experience, certifications, or personal projects.
• Strong communication skills specifically working with technical audiences (verbal and written).


Candidates should have experience with the below general skills and at least one of specialist skill categories.

General Skills:
• Scripting language experience. (Python, Ruby, etc.)
• Experience with virtualization and emulation tools. (VMware, KVM, QEMU, etc.)
• Experience with common IP network principles. (Ex: IP address, subnetting, routing, NAT, VLANs, etc.)
• Experience developing vulnerabilities and CVEs into proof-of-concept exploits.

Software Reverse Engineering:
• Experience developing in C/C++.
• Experience with assembly languages. (Ex: x86-64, ARM, MIPS, etc.)
• Experience with database query languages. (Ex: SQL)
• Experience with reverse engineering tools and debuggers. (Ghidra, IDAPro, etc.)
• Demonstrated knowledge of internals for a major operating system. (Ex: Windows, Linux, macOS, Android, iOS, and real-time operating systems)

Hardware Reverse Engineering:
• Experience dumping firmware.
• Experience with hardware wire protocols. (Ex: SPI, I2C, USB, Modbus, CAN bus)
• Experience with electronics test equipment. (Ex: Oscilloscopes, logic analyzers, JTAGs, traffic generators, etc.)
• Experience with RF test equipment. (Ex: SDRs, spectrum analyzers, etc.)
• Experience with advanced techniques. (Ex: Glitching)

Protocol Reverse Engineering:
• Experience with protocol analysis tools. (Ex: Wireshark)
• Experience with common protocols including Data Exchange Formats (Ex: JSON, XML, etc.); Data Transfer Protocols (Ex: HTTP(S), MQTT, WebSocket); Network Service Protocols (Ex: DHCP, DNS, SNMP, etc.); Wireless (Ex: Wi-Fi, Bluetooth, 5G, ZigBee, LoRaWAN, etc.); Tunneling (IPsec, OpenVPN, Wireguard, etc.); and Media Protocols (SIP, HTML5 audio/video, etc.)
Clearance Level: TS/SCI w/Poly SP
Other Important Information You Should Know
Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings.
Ability to Work Remotely: Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility.
Work Schedules: Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits.
Schedule for this Position: 9x80 every other Friday off
Lockheed Martin is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.
The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration.
At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the worlds most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work.

With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility.

If this sounds like a culture you connect with, you’re invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications.
Experience Level: Experienced Professional
Business Unit: RMS
Relocation Available: Possible
Career Area: Cyber Security
Type: Task Order/IDIQ
Shift: First

• Interest in Offensive Cyber and/or hacking demonstrated through experience, certifications, or personal projects.
• Strong communication skills specifically working with technical audiences (verbal and written).


Candidates should have experience with the below general skills and at least one of specialist skill categories.

General Skills:
• Scripting language experience. (Python, Ruby, etc.)
• Experience with virtualization and emulation tools. (VMware, KVM, QEMU, etc.)
• Experience with common IP network principles. (Ex: IP address, subnetting, routing, NAT, VLANs, etc.)
• Experience developing vulnerabilities and CVEs into proof-of-concept exploits.

Software Reverse Engineering:
• Experience developing in C/C++.
• Experience with assembly languages. (Ex: x86-64, ARM, MIPS, etc.)
• Experience with database query languages. (Ex: SQL)
• Experience with reverse engineering tools and debuggers. (Ghidra, IDAPro, etc.)
• Demonstrated knowledge of internals for a major operating system. (Ex: Windows, Linux, macOS, Android, iOS, and real-time operating systems)

Hardware Reverse Engineering:
• Experience dumping firmware.
• Experience with hardware wire protocols. (Ex: SPI, I2C, USB, Modbus, CAN bus)
• Experience with electronics test equipment. (Ex: Oscilloscopes, logic analyzers, JTAGs, traffic generators, etc.)
• Experience with RF test equipment. (Ex: SDRs, spectrum analyzers, etc.)
• Experience with advanced techniques. (Ex: Glitching)

Protocol Reverse Engineering:
• Experience with protocol analysis tools. (Ex: Wireshark)
• Experience with common protocols including Data Exchange Formats (Ex: JSON, XML, etc.); Data Transfer Protocols (Ex: HTTP(S), MQTT, WebSocket); Network Service Protocols (Ex: DHCP, DNS, SNMP, etc.); Wireless (Ex: Wi-Fi, Bluetooth, 5G, ZigBee, LoRaWAN, etc.); Tunneling (IPsec, OpenVPN, Wireguard, etc.); and Media Protocols (SIP, HTML5 audio/video, etc.)
(Job and company information not to be copied, shared, scraped, or otherwise disseminated/distributed without explicit consent of JSfirm, LLC)

JSfirm, LLC

Roanoke, TX

jobs@jsfirm.com

JSfirm LLC, Privacy Policy

All rights reserved. 2001-2024 JSfirm