Do you thrive on innovating new ways to break into the world’s most secure cutting-edge systems and networks? If you find fulfillment in planning (or defending against) a new exploit, come join Lockheed Martin Cyber & Intelligence’s Offensive Cyber community. We develop the techniques, tools, and exploits used in world-class offensive cyber operations and the defense against them. What We’re Doing:Lockheed Martin, Cyber & Intelligence invites you to step up to one of today’s most daunting challe... more details
Do you thrive on innovating new ways to break into the world’s most secure cutting-edge systems and networks?
If you find fulfillment in planning (or defending against) a new exploit, come join Lockheed Martin Cyber & Intelligence’s Offensive Cyber community.
We develop the techniques, tools, and exploits used in world-class offensive cyber operations and the defense against them.
What We’re Doing:
Lockheed Martin, Cyber & Intelligence invites you to step up to one of today’s most daunting challenges: the evolving threat of cyber warfare. As a Reverse Engineer / Vulnerability Researcher professional at Lockheed Martin, you’ll protect the networks that our citizens and the world depend upon each minute. Here, you’ll work with cybersecurity experts on the forefront of threat protection and proactive prevention. In this fast-paced, real-world environment, you’ll draw on all your education and experience as well as the resources of Lockheed Martin to keep the threats at bay.
Do you want to lead the way in processes, techniques, tools, tactics, and technology supporting Offensive Cyber Operations?
Are you skilled in Reverse Engineering or Vulnerability Research?
We need strong contributors who are interested in;
1. Creating an ideal environment for research
2. Automating RE tools and processes
3. Communicating results
If that sounds like you, come join our team!
Why Join Us:
Your Health, Your Wealth, Your Life
Our flexible schedules, competitive pay and comprehensive benefits enable you to live a healthy, fulfilling life at and outside of work.
Learn more about Lockheed Martin’s competitive and comprehensive benefits package.
#RMSCYTJ
#RMSC6ISR
This position is participating in our External Referral Program. If you know somebody who may be a fit, click here to submit a referral. If your referral is hired, you'll receive a $3000 payment! code-extrefer - Interest in Offensive Cyber and/or hacking demonstrated through experience, certifications, or personal projects.
- Communication skills specifically working with technical audiences (verbal and written).
Candidates should have experience with the below general skills and at least one of specialist skill categories.
General Skills:
• Scripting language experience. (Python, Ruby, etc.)
• Experience with virtualization and emulation tools. (VMware, KVM, QEMU, etc.)
• Experience with common IP network principles. (Ex: IP address, subnetting, routing, NAT, VLANs, etc.)
• Experience developing vulnerabilities and CVEs into proof-of-concept exploits.
Software Reverse Engineering:
• Experience developing in C/C++.
• Experience with assembly languages. (Ex: x86, x64, ARM, MIPS, etc.)
• Experience with database query languages. (Ex: SQL)
• Experience with reverse engineering tools and debuggers. (Ghidra, IDAPro / IDA Pro, etc.)
• Demonstrated knowledge of internals for a major operating system. (Ex: Windows, Linux, macOS, Android, iOS, and real-time operating systems)
Hardware Reverse Engineering:
• Experience dumping firmware.
• Experience with hardware wire protocols. (Ex: SPI, I2C, USB, Modbus, CAN bus)
• Experience with electronics test equipment. (Ex: Oscilloscopes, logic analyzers, JTAGs, traffic generators, etc.)
• Experience with RF test equipment. (Ex: SDRs, spectrum analyzers, etc.)
• Experience with advanced techniques. (Ex: Glitching)
Protocol Reverse Engineering:
• Experience with protocol analysis tools. (Ex: Wireshark)
• Experience with common protocols including Data Exchange Formats (Ex: JSON, XML, etc.); Data Transfer Protocols (Ex: HTTP(S), MQTT, WebSocket); Network Service Protocols (Ex: DHCP, DNS, SNMP, etc.); Wireless (Ex: Wi-Fi, Bluetooth, 5G, ZigBee, LoRaWAN, etc.); Tunneling (IPsec, OpenVPN, Wireguard, etc.); and Media Protocols (SIP, HTML5 audio/video, etc.) - Current DoD Top Secret SCI with Polygraph is required
- 5+ years experience as a developer
- Bachelors degree from an accredited college in a technical discipline, or equivalent experience/combined education
- One of the following skills set area from the Desired Skills section (listed below)