Job Title: Lead, Security and Vunerability Research Engineer
Job Code: 1934
Job Location: Palm Bay, FL
Job Description:
Responsible for the internal or customer administration, maintenance and management of capacity resources for computers at the operating system and infrastructure level. Builds, configures, troubleshoots and integrates new and existing servers to provide service enhancements, application deployments and infrastructure upgrades. Sets up administrator and service accounts, maintains system documentation, tunes system performance, installs system-wide software, and allocates mass storage space. Recommends software and hardware enhancements, diagnoses and corrects issues, defines and implements new services with the goal of achieving maximum server uptime and availability for the customers. Responsible for monitoring performance, system usage. Contributes towards the Disaster Recovery Plan (DRP), backup systems and disk configurations. Conducts system analysis and development to keep systems current with changing technologies.
Essential Functions:
Conducting research for the purposes of finding new vulnerabilities and enhancing existing capabilities
Circumventing security protection methods and techniques
Reverse engineering complex systems and protocols
Creating detailed technical reports to document findings and writing proof of concept code
Qualifications:
Bachelor’s Degree and a minimum of 9+ years of prior related experience. Graduate Degree or equivalent with 7+ years of prior related experience. In lieu of a degree, minimum of 15 years of prior related experience.
Understanding of Cellular (2G/4G/5G Wireless) & Malware/Exploit Detection
Experience analyzing and reverse engineering architectures, such as: AARCH32, AARCH 64, & C66x
Experience programing with languages such as: Python, C, C++, C#, Java, and JavaScript
Experience working within Protection / Privilege Levels: Bootchain, Kernelmode,TrustZone, Sandbox, Usermode
Experience working with classes of exploitation, such as: Local Privilege Escalation (LPE), Remote Code Execution (RCE), Sandbox Escape, Stack Overflow, DEP, ASLR, etc.
Experience working with Reverse Engineering Tools, such as: GDB, JTAG, Ghidra or IDA PRO (Hex-rays Decompiler).
Experience using development applications, such as CLion, Clang/LLVM, CMake, CCS
Current/active TS/SCI security clearance
Preferred Additional Skills:
Extensive knowledge of C/C++, python, assembly language or additional scripting and programming languages
Experience in reverse engineering
Experience with disassembly tools
Experience with vulnerability research
Experience with RISC architectures
Experience with prevalent radio communication protocols
Experience with operating system internals including solid knowledge of information security, computer architecture, software and hardware protection schemes, and virtualization theory
Experience with userland and kernel mode debugging, including debugging in embedded environments
Experience writing custom IDA loaders, processor modules, IDA python, and Hex-Rays decompiler plugins
Knowledge of fuzzing and virtualization
GIAC/ISC2/CEH Certifications
Active TS/SCI Security Clearance with CI Poly highly preferred
L3Harris Technologies is proud to be an Affirmative Action/Equal Opportunity Employer. L3Harris is committed to treating all employees and applicants for employment with respect and dignity and maintaining a workplace that is free from unlawful discrimination. All applicants will be considered for employment without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender (including pregnancy, childbirth, breastfeeding or other related medical conditions), gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, characteristic or membership in any other group protected by federal, state or local laws. L3Harris maintains a drug-free workplace and performs pre-employment substance abuse testing and background checks, where permitted by law.