Junior Researcher jobs in Arlington, MA

T
Junior Offensive Cyber Security Researcher
  • The Charles Stark Draper Laboratory Inc
  • Cambridge, MA OTHER
  • Overview

    Draper is an independent, nonprofit research and development company headquartered in Cambridge, MA. The 2,000 employees of Draper tackle important national challenges with a promise of delivering successful and usable solutions. From military defense and space exploration to biomedical engineering, lives often depend on the solutions we provide. Our multidisciplinary teams of engineers and scientists work in a collaborative environment that inspires the cross-fertilization of ideas necessary for true innovation. For more information about Draper, visit www.draper.com.

     

    Our work is very important to us, but so is our life outside of work. Draper supports many programs to improve work-life balance including workplace flexibility, employee clubs ranging from photography to yoga, health and finance workshops, off site social events and discounts to local museums and cultural activities. If this specific job opportunity and the chance to work at a nationally renowned R&D innovation company appeals to you, apply now www.draper.com/careers.

     

     

    Equal Employment Opportunity

    Draper is committed to creating a diverse environment and is proud to be an affirmative action and equal opportunity employer.   We understand the value of diversity and its impact on a high-performance culture.  All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, disability, age, sexual orientation, gender identity, national origin, veteran status, or genetic information.   

     

    Draper is committed to providing access, equal opportunity and reasonable accommodation for individuals with disabilities in employment, its services, programs, and activities. To request reasonable accommodation, please contact hr@draper.com.

    Responsibilities

    Draper is actively seeking candidates to support current and future offensive cybersecurity projects across a variety of domains supporting the United States of America's national interest and advancing cutting edge research in the fields of Reverse Engineering and Vulnerability Research. Due to the nature of delivering mission-critical capabilities and developing novel applications, the ideal candidate should utilize an interdisciplinary approach to problems and leverage knowledge in other domains and fields. The position has the opportunity to contribute to numerous development efforts encompassing: reverse engineering, exploit development, red teaming, offensive cyber security projects, fuzzing, obfuscation, binary uplifting, and program analysis and synthesis.

    actively seeking candidates to support current and future offensive cybersecurity projects across a variety of domains supporting the United States of America's national interest and advancing cutting edge research in the fields of Reverse Engineering and Vulnerability Research. Due to the nature of delivering mission-critical capabilities and developing novel applications, the ideal candidate should utilize an interdisciplinary approach to problems and leverage knowledge in other domains and fields. The position has the opportunity to contribute to numerous development efforts encompassing: reverse engineering, exploit development, red teaming, offensive cyber security projects, fuzzing, obfuscation, binary uplifting, and program analysis and synthesis.

     

    Qualifications

    Within the Offensive Cyber Security group we acknowledge that many people in the field may have non-traditional educational paths and we want to encourage all potential applicants to apply.

     

    Applicants should satisfy at least two or more of the following:

    • Approximately 1 year plus of job or personal experience in the field, with work related directly to Reverse Engineering and/or Vulnerability Research.
    • A degree in Computer Science, Computer Engineering, or related discipline.
    • Familiarity with common types of software and/or hardware vulnerabilities and exploits.
    • Fluency and experience developing tools in one of the following preferred programming languages:
      • Assembly, C, C , Python, Rust, OCaml
    • Familiarity and experience with binary disassembler/decompiler tools.

     

    Preferred Qualifications

     

    The Offensive Cyber Security group strives to ensure that we all continually improve our technical and personal skillsets to ensure that we remain at the forefront of novel research and development. As such we strongly believe that having a healthy and positive team environment is essential for encouraging individual and team growth.

    • Personable, friendly, and willingness to engage with peers.
    • Enthusiastic about personal and group-based technical growth.
    • Ability to communicate clearly and concisely with others to aid in knowledge transfer.

    Due to the interdisciplinary aspects of the position the applicants are not expected to have familiarity with all of the following desired skills but familiarity with at least one or more of the following topics, tools, or techniques will be beneficial to accelerating the process.

     

    General:

    • Familiarity with one or more hardware or hypervisor architectures:
      • x86, x86_64, ARM, RISC-V, VT-x, SVM
    • Familiarity with one or more operating system internals:
      • Windows, GNU/Linux, QNX, RTOS
    • Understanding of Network Technologies
      • TCP/IP and UDP datagrams
      • Knowledge of the OSI model
      • Deep Packet Capture and Analysis

    Software Domain:

    • User-mode and kernel-mode debuggers.
    • Experience with static and dynamic program analysis for binary and/or network domains.
    • Knowledge of compiler internals and passes.
    • Web application penetration testing.

    Embedded Domain:

    • Discovery and usage of debug interfaces with target devices via JTAG/SWD/BDM.
    • Custom filesystem extraction and modification, removal and/or regeneration of OOB/CRC data.
    • Bus and protocol analysis / reverse engineering.

    Hardware Domain:

    • eMMC/NAND/SPI flash data extraction and flashing.
    • Competent electronic skills (soldering and in-circuit debugging).
    • Side channel attack (glitching) experience to place components and/or devices into altered states to bypass protection.

    Security Requirement:     

    • Applicants selected for this position will be required to obtain and maintain a government security clearance. 

     

     

  • 7 Days Ago

T
Junior Offensive Cyber Security Researcher
  • The Charles Stark Draper Laboratory Inc
  • Cambridge, MA OTHER
  • Overview Draper is an independent, nonprofit research and development company headquartered in Cambridge, MA. The 2,000 employees of Draper tackle important national challenges with a promise of deliv...
  • 7 Days Ago

N
Researcher
  • NEIGHBORHOOD ASSISTANCE CORP. OF AMERICA
  • Boston, MA FULL_TIME
  • RESEARCHER SALARY RANGE: $45,000 - $65,000 FLSA: Exempt LOCATION: Boston, MA CONTACT: jobs@naca.com or 617-250-6222 ext.1221 BENEFITS: Comprehensive package: single/family health, vision, dental, 401(...
  • 1 Day Ago

M
Lecturer-Researcher
  • MIT
  • Cambridge, MA FULL_TIME
  • LECTURER-RESEARCHER, School of Architecture and Planning-Norman B. Leventhal Center for Advanced Urbanism (LCAU) , to teach graduate-level courses (50%) and conduct research (50%) in the area of techn...
  • Just Posted

A
Market Researcher
  • Agero
  • Medford, MA FULL_TIME
  • About Agero: Wherever drivers go, we're leading the way. Agero's mission is to rethink the vehicle ownership experience through a powerful combination of passionate people and data-driven technology, ...
  • Just Posted

T
Ophthalmology Researcher
  • Tufts Medical Center
  • Boston, MA OTHER
  • We’re saving lives, building careers, and reimagining healthcare. We can’t wait to grow alongside you. The Department of Ophthalmology seeks a faculty researcher to be a member of the Special and Scie...
  • 9 Days Ago

Filters

Clear All

  • Filter Jobs by companies
  • More

0 Junior Researcher jobs found in Arlington, MA area

Arlington is a town in Middlesex County, Massachusetts, United States, six miles (10 km) northwest of Boston. The population was 42,844 at the 2010 census. Arlington covers 3,517.5 acres (14 km2), or 5.5 square miles, of which 286.2 acres (1.2 km2) are covered by water. There are 210.52 acres (0.9 km2) of parkland. Elevation ranges from 4 feet (1.2 m) above sea level (along Alewife Brook) to 377 feet (114.9 m) near Park Avenue and Eastern Avenue. Arlington borders on the Mystic Lakes, Mystic River, and Alewife Brook. Within its borders are Spy Pond, the Arlington Reservoir, Mill Brook, and Hil...
Source: Wikipedia (as of 04/11/2019). Read more from Wikipedia
Income Estimation for Junior Researcher jobs
$115,487 to $153,529
Arlington, Massachusetts area prices
were up 2.5% from a year ago

Junior Researcher
Prepare IRB applications and consent forms, and design data collection instruments.
August 01, 2022
Facilitate feedback sessions post candidate interviews to gain consensus around hiring decisions and/or learn from any "misses".
December 07, 2022
Follows up with internal and external Clients after fieldwork completion to ensure complete satisfaction.
January 30, 2023
Develop research manuscripts to disseminate findings to the academic community.
February 20, 2023
Supporting the Vice President of Talent Acquisition, interview scheduling, travel coordination and on-boarding logistics.
February 27, 2023
Tracks project budgets and monitors/approves vendor invoices.
March 28, 2023
Confirms and communicates all project schedules, logistics and details in writing to entire Team (internal and external clients).
April 25, 2023