University Programs: Vulnerability Researcher Intern
Raytheon - State College PA

Internship Category: Paid

Description
Description
Map
Reviews
  • Raytheon Cyber Security Innovations (CSI) is seeking undergraduate and graduate college students for Vulnerability Researcher (VR) internships in support of senior cybersecurity engineers and VR activities for the summer of 2018. CSIs passion is work that challenges, engages, and empowers real-world mission impact which means our research and development efforts cover the full spectrum of security technologies for computer network operations. If it is important and runs code, someone in our office has looked at it.

    Required Skills:

    • Vulnerability Research (code analysis, fuzzing, shellcode)
    • Reverse Engineering (x86/ARM, IDA Pro, Binary Ninja, gdb)
    • Wireless and Network Communications (sockets, 802.11n, GSM)
    • Kernel Development (Windows, Linux, OS X)
    • Hypervisors and System Emulation
    • Mobile/Embedded Development

    Basically, if it involves cybersecurity, were doing something cool with it. The strongest candidates will have a variety of low-level operating systems experience and cross-platform vulnerability research. If you’ve discovered a kernel paged pool exploit, modified JIT engines to add your own instrumentation to mitigate entire vulnerability classes, created a heap-based buffer overflow with ASLR/DEP defeats, used solvers to highlight interesting call/dataflow graphs, or created custom hardware emulators you’ll be right at home in CSI.

    Candidates must be able to play both sides of the fencedeveloping and defeating advanced new security techniques. Projects are undertaken on small teams in close coordination with customers to quickly deliver or enhance capabilities.

    Requirements:

    • Pursuing a Bachelor’s or Master’s Degree in cybersecurity-relevant field (e.g., CS, CPE, EE)
    • Proficiency in one or more scripting languages (e.g., Python, Ruby, Bash, Powershell)
    • Proficiency in one or more systems programming languages (e.g., C/C++)
    • Familiarity with low-level architectures (e.g., x86, ARM)
    • This position requires the ability to access systems that contain information restricted to US Citizens based on certain Federal Government contractual requirements.

    Desired Skills:

    • Computer network operations experience (e.g., CTFs, red/blue teams, pentesting)
    • Networked communications development (e.g., TCP/UDP sockets, Bluetooth, GSM)
    • Reverse engineering experience (e.g., IDA Pro, WinDbg, ollydbg, gdb, objdump)
    • Hardware emulation development (e.g., QEMU, Unicorn, Panda, VHDL)
    • Cryptographic experience (e.g., implementing AES, side channel attacks)

    Our Interviews:

    Our interviews are technical. Come prepared to tell us about your technical background and interests as well as to work through some of our questions on a computer or whiteboard. Our questions are meant to be thought provoking, not brainteasers or tricks. This is a chance to have a dialog with our team, and we hope you will enjoy it!

    Work may be performed in our Arlington, VA; Dulles, VA; and State College, PA offices.

    107625

    Raytheon is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.

    Raytheon Cyber Security Innovations (CSI) is seeking undergraduate and graduate college students for Vulnerability Researcher (VR) internships in support of senior cybersecurity engineers and VR activities for the summer of 2018. CSIs passion is work that challenges, engages, and empowers real-world mission impact which means our research and development efforts cover the full spectrum of security technologies for computer network operations. If it is important and runs code, someone in our office has looked at it.

    Required Skills:

    • Vulnerability Research (code analysis, fuzzing, shellcode)
    • Reverse Engineering (x86/ARM, IDA Pro, Binary Ninja, gdb)
    • Wireless and Network Communications (sockets, 802.11n, GSM)
    • Kernel Development (Windows, Linux, OS X)
    • Hypervisors and System Emulation
    • Mobile/Embedded Development

    Basically, if it involves cybersecurity, were doing something cool with it. The strongest candidates will have a variety of low-level operating systems experience and cross-platform vulnerability research. If you’ve discovered a kernel paged pool exploit, modified JIT engines to add your own instrumentation to mitigate entire vulnerability classes, created a heap-based buffer overflow with ASLR/DEP defeats, used solvers to highlight interesting call/dataflow graphs, or created custom hardware emulators you’ll be right at home in CSI.

    Candidates must be able to play both sides of the fencedeveloping and defeating advanced new security techniques. Projects are undertaken on small teams in close coordination with customers to quickly deliver or enhance capabilities.

    Requirements:

    • Pursuing a Bachelor’s or Master’s Degree in cybersecurity-relevant field (e.g., CS, CPE, EE)
    • Proficiency in one or more scripting languages (e.g., Python, Ruby, Bash, Powershell)
    • Proficiency in one or more systems programming languages (e.g., C/C++)
    • Familiarity with low-level architectures (e.g., x86, ARM)
    • This position requires the ability to access systems that contain information restricted to US Citizens based on certain Federal Government contractual requirements.

    Desired Skills:

    • Computer network operations experience (e.g., CTFs, red/blue teams, pentesting)
    • Networked communications development (e.g., TCP/UDP sockets, Bluetooth, GSM)
    • Reverse engineering experience (e.g., IDA Pro, WinDbg, ollydbg, gdb, objdump)
    • Hardware emulation development (e.g., QEMU, Unicorn, Panda, VHDL)
    • Cryptographic experience (e.g., implementing AES, side channel attacks)

    Our Interviews:

    Our interviews are technical. Come prepared to tell us about your technical background and interests as well as to work through some of our questions on a computer or whiteboard. Our questions are meant to be thought provoking, not brainteasers or tricks. This is a chance to have a dialog with our team, and we hope you will enjoy it!

    Work may be performed in our Arlington, VA; Dulles, VA; and State College, PA offices.

    107625

    Raytheon is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.

  • No Records Found

    Sorry, no records were found. Please adjust your search criteria and try again.

    Google Map Not Loaded

    Sorry, unable to load Google Maps API.

  • Leave a Review