Principal Vulnerability Research Engineer

Employment Type

: Full-Time

Industry

: Engineering



The Systems Engineering, Integration & Test Electronic Warfare (EW) Electronic Attack (EA) Systems Department is seeking a Principal Vulnerability Research (VR) Engineer.

As part of the Systems Engineering, Integration & Test (SEIT) Electronic Warfare (EW) Electronic Attack (EA) Systems Department, we require a Principal Vulnerability Research (VR) Engineer with experience in the analysis, characterization, and adaptation (reverse engineering) of electronic systems to lead projects in support of the Electronic Warfare Systems (EWS) business area relating to Airborne Information Operations (AIO) and Access Enablement. This Vulnerability Research Engineer position requires proven technological experience demonstrating a keen desire to determine how systems of interest function – and how to adapt them to function in alternate ways. The successful candidate will work on small, fast-paced teams and be expected to support all stages of the project lifecycle (concept/idea development through end-user fielding and operation).

The Principal VR Engineer characterizes communication and information-processing electronic systems and will be challenged by problems involving state-of-the-art commercial and military RF communications techniques (advanced modulation, transport, and antenna systems), digital processing subsystems, and interfaces with computer software elements. They will participate in the architecture and design of similar systems/subsystems by working with small, agile teams. They will produce written and oral communication, interfacing with customers and end-users, as part of the quick-reaction solution team. They will work with test equipment, electronic/RF laboratory equipment, computers, and multiple personnel from both Engineering and other functional organizations (e.g., technicians, finance, security, business development, and contracts).

The Principal VR Engineer has responsibility for identifying and characterizing all mission-relevant vulnerabilities on complex electronic/communication products and leveraging those vulnerabilities in support of the customer mission, either offensively or defensively. They are a key player in the quick-reaction solution team, carry a large degree of responsibility for mission success, and are accountable to the Program Chief Engineer and Section Manager for all job requirements.

The position falls within the Access Enablement group of the Radio Frequency Exploitation Solutions (RFES) Product Area which is a small off-site group of diverse engineers enabling access solutions for some of the country’s most critical warfighting and information operations (IO) needs. Composed primarily of multi-domain systems and software engineers, the group performs vulnerability research on commercial and non-commercial products, developing solutions and/or mitigations, and integrating these solutions into field-deployable products providing the warfighter or operator with an asymmetric advantage. We work in small teams, typically of two to four engineers, aiming to understand the entire problem space and rapidly prototype solutions on timescales measured in weeks or months, not years.

* Required Skills:
  • Minimum 8 years related systems engineering (SE) experience
  • Ability to obtain DoD Top Secret security clearance within one year of employment
  • Demonstrated experience with reverse engineering and vulnerability research of communications/electronic systems
  • Demonstrated engineering experience with state-of-the-art RF communications systems (e.g., 4G/5G cellular, terrestrial wireless backhaul, custom VHF/UHF digital radios)
  • Demonstrated ability to establish and monitor technical priorities to meet and status cost, schedule, and performance
  • Experience working in small groups to develop solutions and resolve technical issues
  • Experience preparing, reviewing, and presenting engineering work products to internal and external stakeholders
  • Ability to assess team members’ performance to reward/recognize and provide candid development feedback
  • Current Secret Clearance required.
  • U.S. Citizenship status is required as this position will need a U.S. Security Clearance within 1 year of start date.

    Desired Skills:
  • Current DoD Top Secret clearance with investigation within past five years
  • Experience in agile electronics/communications design – architecture, documented design, trades/analyses, performance analysis, testing, and post-delivery support
  • Experience managing cost and schedule as an IPT Lead
  • Experience leading subcontractor technical teams including SOW development, technical direction, and work product acceptance
  • Experience contributing to cost and technical volumes for new business/proposals
  • Experience developing, tracking, and reporting on TPMs, KPPs, and other measures of effectiveness
  • Experience developing and submitting technical publications and/or patents
  • U.S. Citizenship status is required as this position will require the ability to access US only data systems.
    U.S. Citizenship status is required as this position will need a U.S. Security Clearance within 1 year of start date.

    * Required Education:
    Bachelor’s degree in Electrical Engineering, Systems Engineering.

    Desired Education:
    Master’s degree in Electrical Engineering, Systems Engineering.


    Electronic Warfare Capabilities
    Electronic Warfare Jobs
    #ownthespectrum 156464


    Raytheon is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.

    * The salary listed in the header is an estimate based on salary data for similar jobs in the same area. Salary or compensation data found in the job description is accurate.

    Launch your career - Create your profile now!

    Create your Profile

    Loading some great jobs for you...