Cyber Vulnerability Scientist (PhD)

Are youpassionate about making impactful technical contributions to critical nationalsecurity cyber challenges?

Do you loveresearching the toughest problems and want to work for an employer who prioritizescontinual innovation and personal development?

If so, we'relooking for someone like you to join our innovative team at APL!

We areseeking a creative researcher to imagine new and innovative ways to rapidly andsystematically exploit embedded systems before our adversaries do. We haveworld-class facilities uniquely tailored to analyzing communications systems,transportation systems, and critical infrastructure. We strive to foster aninnovative and collaborative team environment where breakthroughs in researchcan be applied to real-world problems.

As a memberof our team, you will…

  • Partner with leadership to develop a strategic vision for rapidly and systematically analyzing large quantities of software binaries
  • Research, design, and develop algorithms, techniques, and tools for rapid and scalable reverse engineering
  • Propose new ideas to internal and external funding opportunities and devise ways to incorporate research concepts into ongoing programs
  • Circulate knowledge by clearly articulating ideas through papers and presentations to team members, APL management, and government decision makers

You meet ourminimum qualifications for the job if you have...
  • A PhD in Computer Science, Computer Engineering, Electrical Engineering, or a related field with 2 or more years of relevant professional experience
  • Experience in software binary or source code analysis
  • Technical knowledge of computer architectures, compiler design, and operating system internals
  • Experience reading or writing assembly (x86/x64, Arm, PowerPC, MIPS, or others),
  • Expertise with one or more programming languages including C/C and Python
  • An ability to obtain an Interim Secret security clearance by your start date and ultimately obtain a TS/SCI with polygraph clearance. If selected, you will be subject to a government security clearance investigation and must meet the requirements for access to classified information. Eligibility requirements include U.S. citizenship

You'll goabove and beyond our minimum requirements if you have ...
  • Experience applying artificial intelligence and machine learning to software analysis
  • Proficiency with software debuggers, static analysis tools (IDA Pro, Binary Ninja, Ghidra, etc.), and symbolic execution tools
  • Experience writing published papers and proposals
  • 5 or more years of relevant professional experience, particularly working with Government agencies
  • A current TS/SCI clearance with full scope polygraph


Why work at APL?

The Johns Hopkins University Applied Physics Laboratory (APL) brings world-class expertise to our nation's most critical defense, security, space and science challenges. With a wide selection of challenging, impactful work and a robust education assistance program, APL promotes a culture of life-long learning. Our employees enjoy generous benefits and healthy work/life balance. APL's campus is located in the Baltimore-Washington metro area. Learn more about our career opportunities atwww.jhuapl.edu/careers.

APL is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, sexual orientation, national origin, disability status, veteran status, or any other characteristic protected by applicable law.


Meet Some of Johns Hopkins Applied Physics Laboratory's Employees

Gianni P.

Electrical Engineer

Gianni works on the design, modeling, and simulation of low- to high-fidelity radar projects for the lab. He also conducts tests to evaluate new technologies.

Mary A.

Lead RF Systems Engineer

Mary Ann builds prototypes and integrates software and hardware communications in order to create complete systems for APL contracts and projects. She also collaborates with her team to fix software issues.


Back to top