You are viewing a preview of this job. Log in or register to view more details about this job.

Reverse Engineering Intern

Please Note:

Because we are not doing in-office interviews and all of our positions are currently remote, we have a new interview process on Google Forms where you can choose a position that you are interested in applying for and record a quick 1–3-minute video on your experience and why you would be a good fit for the position. Please be sure to share with us previous or current projects related to the position to give us an idea of your background in Computer Science and why you would be a good fit.

The link to the Google Form application can be found at It is required to fill out the Google Forms and submit your resume through Handshake to be considered for the position.

Our Company:

ObjectSecurity provides software solutions that proactively secure OT/ICS assets in critical industrial infrastructure and mitigate supply chain risk. Our holistic, proactive approach prevents cyber attacks and disruptive production downtime across industries that support global citizen communities, including military defense, municipal smart cities, public and private transportation, energy, wastewater treatment, power utilities, manufacturing, and the life sciences. For more than 20 years, ObjectSecurity has been delivering cybersecurity and supply chain risk management solutions including to U.S. defense and federal government agencies. These advanced technologies are now commercially available for government and private sector use. ObjectSecurity is privately-held with headquarters in San Diego, CA, with global representation.

We are doing exciting other product developments, including a supply chain risks analysis product which takes an SAP data dump and turns it into a graph DB, and then runs analytics over it to identify risks. Another cool project is an "AI hacker" development, which uses AI to simulate a hacker.

Reverse Engineering Intern Position:

We are looking for an intern with prior experience working on analyzing binaries using various tools. This may be using a debugger, static analysis with tools such as Ghidra or IDA Pro, from CTF competitions, emulation with tools like Angr, dynamic analysis and rehosting, etc. We currently have contracts with the Navy and DARPA to analyze binaries on embedded systems, and have our own binary analysis platform called ObjectSecurity OT.AI Platform.

In part 2 of the application, please list tools that you have used in the past and your prior work. We are looking for interns to join us for both during the semester and during the summer. We are flexible with start and end dates of the internship and how many hours interns work per week.

This description details the initial internship project, but depending on how long it takes to complete, there is always room to grow with our company and switch over to other projects. There’s also scope for moving into other focus areas such as machine learning, AI, information modeling, analytics, cybersecurity and more. The sky is the limit!


1) Available 8-16 hours per week virtually

2) Prior experience with reverse engineering, using various tools to analyze binaries, and/or extracting firmware off of a device either with an internship/job, from classes, a prior internship or from a research project.

Learning Objectives:

By working directly on software engineering projects hands-on doing reverse engineering, frontend, backend, AI/ML and/or working on embedded systems, hardware and/or microelectronics, interns will gain valuable experience in the software engineering field and improve upon their computer science skills as evidenced through their weekly projects.


1) While we are based out of San Diego, all of our positions are remote.

2) Weekdays and hours worked are flexible based on the student's schedule but should be communicated to supervisor at the beginning of each week.

3) We will communicate with the intern virtually via email, Slack and Zoom. A supervisor will meet with the intern at the start of the day to go over the day's tasks and check in at the end of each day.

4) Materials will be provided to interns at the beginning of the day. All interns are expected to push their code at the end of each work day to GitHub.

5) If interns are stuck or run into an issue with their code, they are encouraged to reach out to their supervisor, since someone will almost always be available to help.