Date Posted:
2023-09-13
Country:
United States of America
Location:
FL711: Raytheon SI Gov Dixie Hwy 3520 Dixie Highway NE , Palm Bay, FL, 32905 USA
Position Role Type:
Onsite
This position is for an intern who will be entering their junior or senior year by the start of summer 2024
At Raytheon, the foundation of everything we do is rooted in our values and a higher calling – to help our nation and allies defend freedoms and deter aggression. We bring the strength of more than 100 years of experience and renowned engineering expertise to meet the needs of today’s mission and stay ahead of tomorrow’s threat. Our team solves tough, meaningful problems that create a safer, more secure world.
Job Summary:
This position is an onsite role.
Vulnerability Researcher Interns at Raytheon CODEX learn to analyze systems to understand how they work and how they behave when they break. Candidates must be able to play both sides of the fence, both developing and defeating new and advanced security techniques. Projects are undertaken in small teams with close coordination with mentors. All our engineers write code, but many of our engineers spend as much time taking systems apart as building new ones. A typical day can involve studying disassembly or writing Python to audit a piece of C++ code.
Responsibilities to Anticipate:
- Growth in knowledge of target being researched.
- Regular documentation on research results
- Evaluation of research results
- Modifications to research tools and directions
- Productizing successful research to deliver to a customer
Basic Qualifications:
- Must be enrolled in a Bachelor’s or Master's degree program in Science, Technology, Engineering, or Mathematics (STEM)
- The ability to obtain and maintain a U.S. government issued security clearance is required. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance
- Experience with C or C++
- 2 or more of the following preferred qualifications
Preferred Qualifications:
- Understanding of OS Internals (any major OS)
- Experience reading or writing assembly (x86, x64, ARM, PPC, MIPS, SPARC, 68k, or others)
- Understanding of network protocols (TCP/IP stacks, wire-level protocols, RF communications, BGP, routing protocols, or others).
- Understanding of exploit mitigations such as DEP and ASLR
- Experience using reverse engineering tools such as IDA Pro, HexRays, Ghidra, Binary Ninja, or objdump.
- Experience using debuggers such as gdb, WinDbg, OllyDbg
- Experience building and using tools to find, exploit, and productize vulnerabilities in complex software systems
What We Offer:
Whether you’re just starting out on your career journey or are an experienced professional, we offer a total rewards package that goes above and beyond with compensation; work/life benefits; and career development programs. Some of the benefits we offer include flexible work schedules.
Please upload a copy of your most recent transcripts with your resume when applying to this requisition. Include your cumulative GPA and projected graduation date on your resume
Clearance Information: This position requires the eligibility to obtain a security clearance. The Defense Industrial Security Clearance Office (DISCO), an agency of the Department of Defense, handles and adjudicates the security clearance process. More information about Security Clearances can be found on the US Department of State government website here: https://www.state.gov/m/ds/clearances/c10978.htm
RTX is An Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age or any other federally protected class.
Privacy Policy and Terms:
Click on this link to read the Policy and Terms