What do we do in our Cyber-Physical Systems?The Cyber-Physical Systems Group works closely with the nation's cyber forces, intelligence community, and federal agencies to identify operational gaps in cybersecurity capabilities and analyze their current and planned systems and missions. We focus on enabling full-scope DoD, IC, and civilian government operations within the cyber domain and across traditional mission domains and sensing layers. We conduct research and development of systems providing situational awareness (SA) and command and control (C2) in the cyber domain. Key technology development thrusts include novel sensors, actuators, sense-making, decision support, knowledge representation, Human Machine Interface (HMI), visualization, automated planning, cloud-based information sharing architectures. We integrate these capabilities into secure, resilient, cost-effective information sharing architectures in support of effective mission operations. Group strengths include software development, significant testbed infrastructure, and connections to challenges, people, systems and data from multiple operational communities. Overall, we seek to leap ahead of evolving cyber threats and enable comprehensive and secure use of the cyber domain for military and intelligence missions.Job Description The Cyber-Physical Systems Group at MIT Lincoln Laboratory supports US national security objectives by understanding the cybersecurity implications of physical access/effects to computing systems and by leveraging that understanding for the benefit of the US DoD, intelligence community, and law enforcement agencies. To that end, the group studies the way in which IoT devices, critical infrastructure, and national mission sensor and communication systems interact with the physical world throughout their lifecycles. Of particular interest is exploring ways in which computing systems expose cyber vulnerabilities through both intended interfaces (receivers and transmitters) as well as unintended interfaces (incidental coupling and unintended RF emissions). We are seeking a cyber-physical systems research engineer with an interest in, and aptitude for, embedded systems reverse engineering and vulnerability research. The successful candidate with will work within a multi-disciplinary hardware and software team to reverse engineer and understand embedded systems, evaluate their security postures, and prototype capabilities explore cyber security concepts via physical (e.g. electromagnetic) means. This work will involve both deep system study as well as rapid prototyping in software, firmware, and hardware and will cover initial concept, design, prototyping, laboratory demonstration, and field test evaluation phases. Requirements:Master ??s degree in Computer Science, computer engineering, or related field, or a Bachelor's degree and 3+ years of directly; Related experience with demonstrated domain expertise will be considered.Proficiency in high-level scripting languages such as Python.Proficiency with program debuggers, static and dynamic code analysis techniques, and reverse engineeringThorough understanding of computing architecture design, instruction set architectures, and operating system internals.Demonstrated effective oral and written communication skills.Familiarity with digital logic workflows for both field-programmable gate arrays (FGPAs) and application-specific integrated circuits (ASICs) is preferred. Familiarity with cybersecurity problems and the role of hardware in enforcing security properties of cyber systems is also preferred.Familiarity with hardware description languages for digital logic, such as Verilog.Ability travel on a monthly basis to US Government and cleared defense contractor sites.Applicants selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information For Benefits Information, click MIT Lincoln Laboratory is an Equal Employment Opportunity (EEO) employer. All qualified applicants will receive consideration for employment and will not be discriminated against on the basis of race, color, religion, sex, sexual orientation, gender identity, national origin, age, veteran status, disability status, or genetic information; U.S. citizenship is required.Requisition ID: 26290
Associated topics: identity, identity access management, idm, information security, information technology security, phish, protect, security, threat, violation
* The salary listed in the header is an estimate based on salary data for similar jobs in the same area. Salary or compensation data found in the job description is accurate.