Sorry, this listing is no longer accepting applications. Don’t worry, we have more awesome opportunities and internships for you.

Vulnerability Researcher Intern

Learn more about Raytheon
Raytheon

Raytheon

Vulnerability Researcher Intern

Melbourne, FL
Internship
Paid
  • Responsibilities

    Raytheon Centers of Innovation (COI), part of the company’s Intelligence, Information and Services business, works at the forefront of Cyber Security, providing U.S. government mission solutions. Our work focuses on low-level design and development with small, agile technical teams. We work as partners with end users to create software to address mission-critical objectives. We pursue challenging work with hard problems, and we can see the impact we have on our nation’s security each day.

    KEY AREAS OF FOCUS INCLUDE:

    • Reverse Engineering
    • Vulnerability Research
    • Wireless and Network Communications
    • Hypervisors
    • Malware
    • Mobile/Embedded Development
    • Win32/Linux Kernel development
    • Constraint Solving
    • Exploit mitigation techniques

    Basically, if it’s in the CNO realm, we’re doing something cool with it. Information security continues to be a growth industry and we are constantly looking to find the right candidates who can do this challenging work.

    Raytheon Centers of Innovation (COI) is seeking a current college student for Vulnerability Researcher Intern positions located in Melbourne, Florida to support engineering activities and senior engineers on programs for Summer 2019.

  • Related Article
  • Qualifications

    REQUIREMENTS:

    • Familiarity with at least one common low-level architecture (x86, ARM, etc) is important, as is the ability to conduct vulnerability research against applications compiled for that architecture.
    • Experience with software protection and binary armoring is a plus, and familiarity with modern exploit mitigation techniques and counter-measures is a must.
    • Development experience is desired, but at least some scripting experience is required. Whether in python, ruby, or some other language, you should be capable of quickly developing the tools needed to help you succeed in your reverse engineering and vulnerability research efforts.
    • The strongest candidates will have a variety of low-level operating systems experience as well as cross-platform vulnerability research.
    • If you've written everything from a kernel paged pool exploit to a simple user land stack-based buffer overflow, built your own dynamic instrumentation and integrated a solver to help you identify and reach code, or modified emulators and JIT engines to add your own instrumentation to help you identify entire classes of vulnerabilities, you'll be right at home.
    • Candidates must be able to play both sides of the fence, both defeating and developing new and advanced security techniques.
    • Projects will be undertaken in small teams with close coordination with customers to quickly enhance capabilities or resolve issues in existing tools.
    • Working as part of a team you will also need to be familiar with source management tools such as GIT and subversion
    • This position requires the ability to access systems that contain information restricted to US Citizens based on certain Federal Government contractual requirements.

    REQUIRED EDUCATION:

    • Must have obtained sophomore, junior or senior status by Summer of 2019 (Candidate for graduation in 2020, 2021, and 2022)
    • Must be pursuing a Bachelor’s degree in Computer Science
    • Must have a cumulative GPA of 3.0 or higher is desired
  • Industry
    Defense and Space
  • About Us

    Raytheon Company is a technology and innovation leader specializing in defense, civil government and cybersecurity solutions. Founded in 1922, Raytheon provides state-of-the-art electronics, mission systems integration, capabilities in C5I (command, control, communications, computing, cyber and intelligence), sensing, effects and mission support services.