For better or worse, there is almost no facet of our modern world that works without a computer system. Virtually all of those computer systems rely on “systems software” to manage distinct tasks and bridge the gap between hardware and higher-level software. Whether it is an embedded system using tightly-coupled FPGA fabric to offload performance- or security-critical tasks or a server using a hypervisor to manage co-resident guests, there is low-level code making sure that higher-level code can see a sane and well-ordered world. That lower-level code is full of complexity as it works to bridge the gap from the realities of diverse hardware ISAs to higher-level abstractions. It is also foundational to the security story of all of our systems. At Riverside Research, the Secure and Resilient Systems group works to strengthen that code to provide our customers with secure foundations for their mission-critical software stacks. This is essential to getting ahead of the attacker rather than playing whack-a-mole with bug fixes. Sometimes, computers can help us to analyze and implement protections on these software layers in the form of program analysis and compiler-based security mechanisms.
Riverside Research is seeking an entry-level research scientist to support research and development of cutting-edge systems software, compiler and program analysis security technologies. As a key member of our Secure and Resilient Systems team, the research scientist will prototype new features in open-source operating systems (e.g., Linux), hypervisors (e.g., Xen), compilers (e.g., LLVM) and program analysis tools (e.g., AFL++). Strong fundamentals in software development practices for large projects (version control, debugging techniques, etc), an understanding of the system software stack and the software/hardware interface, and a strong background in computer science fundamentals (e.g., algorithms, data structures, program languages) will be critical for efficiently designing and prototyping dramatic features that advance the state of the art in systems, compilers, and program analysis.
The research scientist will contribute to a diverse team responsible for developing new approaches to increase the security of system software and language runtimes. They will be expected to prototype and push both code and accompanying documentation/design documents. Additionally, they will engage in the research process by assisting the team to design solutions to new challenges, break problems into subtasks, implement features, and evaluate the resulting prototypes. The research scientist should have the writing skills necessary to communicate their ideas and results to internal and external stakeholders.
The research scientist should have experience in C/C++, at least one assembly language, Python, and, for bonus points, Rust. A good candidate should be able to explain why BOTH C and Rust are on this list and why Python is on this list (even though no system software is written in Python). An ideal candidate for this position would have experience writing code that interacts directly hardware and be able to explain the challenges of working at the software/hardware interface and how they’ve overcome those challenges in the past. Experience with tools for program analysis (these may be written in higher-level languages and leverage DSLs or DSL interpreters/compilers) is also desirable. A good candidate research scientist should be able to explain why programing language fundamentals from C to Haskell to different flavors of domain-specific languages are relevant to this role.
Required Qualifications:
Desired Qualifications:
Software Powered by iCIMS
www.icims.com