Software Reverse Engineer, Mid-Level
Listed on 2025-12-02
-
IT/Tech
Cybersecurity, Network Security
Join to apply for the Software Reverse Engineer, Mid-Level role at Jobright.ai
1 day ago Be among the first 25 applicants
Join to apply for the Software Reverse Engineer, Mid-Level role at Jobright.ai
Get AI-powered advice on this job and more exclusive features.
Jobright is an AI-powered career platform that helps job seekers discover the top opportunities in the US. We are NOT a staffing agency. Jobright does not hire directly for these positions. We connect you with verified openings from employers you can trust.
Job Summary:
STR is a technology company focused on cybersecurity and advanced research for defense and national security. They are seeking a Software Reverse Engineer to analyze vulnerabilities in cyber physical systems and develop innovative cybersecurity solutions.
Responsibilities:
• Reverse engineering complex software or firmware targets, ranging from typical Windows/Linux binaries to embedded firmware running non-traditional computer architectures and operating systems
• Developing and applying automated reverse engineering and binary analysis tools to characterize protocols, interfaces, and functionality of target systems
• Developing innovative cybersecurity solutions
• Working in multi-discipline teams to tackle challenging problems from a wide variety of technologies to develop innovative cybersecurity solutions
• Performing vulnerability weaponization, exploit development, payload development, and exploit mitigation on a variety of challenging targets
• Documenting, demonstrating, and presenting research
• Solving real world problems that have an impact on national security
Qualifications:
Required:
• Active Top Secret (TS) security clearance, for which U.S. citizenship is needed by the U.S. Government
• BS, MS or PhD in Computer Science, Computer Engineering, Cybersecurity or related field (or equivalent work experience)
• Experience with binary analysis of software/firmware
• Experience with disassembly tools, such as IDA Pro, Binary Ninja, or Ghidra
• Proficiency in one or more programming languages: C/C++, Python, etc.
• Proficiency in one or more Assembly
Languages:
x86, ARM, etc.
• General understanding of reverse engineering fundamentals: memory layout, calling conventions, etc.
Preferred:
• Vulnerability research and analysis
• Knowledge of weaponizing discovered vulnerabilities into exploits
• Implant or software patch development
• Familiarity with binary emulation or vulnerability research, including tools such as QEMU or AFL++
• Experience with DSP architectures, such as Texas Instruments, STMicroelectronics, NXP, or Analog Devices.
• Knowledge of operating system internals including memory/process/thread management
• Embedded systems or firmware analysis
• Experience development custom emulation tools to enable dynamic analysis
• Experience analyzing and reconstructing code/data flow
• Automated reverse engineering or software analysis tool development
• Experience debugging software without source code
• Knowledge of binary file structures and formats
• Experience analyzing protocols or message structures
• Knowledge of anti-reverse engineering techniques
• Knowledge of intrusion detection and anti-malware systems and techniques
Company:
STR is built on people & technology platforms tackling tough problems in cybersecurity, distributed sensing & artificial. Founded in 2010, the company is headquartered in Woburn, Massachusetts, USA, with a team of 501-1000 employees. The company is currently Late Stage.
Seniority level- Seniority level
Mid-Senior level
- Employment type
Full-time
- Industries Software Development
Referrals increase your chances of interviewing by 2x
Inferred from the description for this jobMedical insurance
Vision insurance
401(k)
Apply BELOW
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).