Cybersecurity Researcher jobs in United States
cer-icon
Apply on Employer Site
company-logo

Two Six Technologies · 5 hours ago

Cybersecurity Researcher

Two Six Technologies builds innovative products to solve complex challenges. They are seeking a Cybersecurity Researcher to join their Embedded Sector, focusing on Vulnerability Research on embedded systems and collaborating with top-tier developers and engineers to enhance national security.

Cyber SecurityInformation TechnologyNetwork Security
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Analyze and solve complex technical challenges with no predefined answers
Perform in-depth reverse engineering to identify vulnerabilities, assess their impact, and transform findings into actionable capabilities
Deconstruct and understand the functionality of intricate technical systems
Navigate ambiguity and independently forge paths toward innovative solutions
Collaborate in a small-team environment, where your contributions will have an outsized impact
Leverage your expertise in digital forensics and watermarking to inform secure development practices and maintain data integrity throughout the product lifecycle

Qualification

Reverse engineeringVulnerability researchC/C++ programmingPython scriptingDigital forensicsFirmware analysisEmulation toolsExploit developmentWireless protocolsClient-facing experienceCryptography knowledgeHardware experienceTeam collaborationProblem solving

Required

Bachelor's (or higher) degree in Computer Science, Computer/Electrical Engineering, or a related field (or equivalent practical experience)
Experience developing, debugging, and scripting in C/C++ and Python within Linux command-line environments, with a strong emphasis on low-level programming, memory management, and system interaction for reverse engineering and vulnerability research
Experience with reverse engineering and vulnerability research, using tools such as IDA Pro, Binary Ninja, or Ghidra
Expertise in one or more of the following: Firmware analysis (ARM, MIPS, PowerPC, RTOS), Firmware rehosting using emulation tools such as QEMU, Fuzzing and exploit development, Binary obfuscation and anti-analysis techniques, Wireless protocols and radio signal analysis, File system forensics and fault injection frameworks
Active Top Secret clearance with eligibility/willingness to obtain a Top Secret/SCI clearance

Preferred

Experience scripting with the Binary Ninja API or Ghidra
Experience with other languages (e.g. Go, Rust)
Knowledge of embedded device security and reverse engineering (e.g., ARM, RTOS)
Familiarity with cryptography concepts and their implementation
Hands-on experience working with hardware and embedded systems
Client-facing experience in technical roles
Prefer active TS/SCI with Poly

Benefits

Medical, dental, and vision insurance
Life and disability insurance
Retirement benefits
Paid leave
Tuition assistance
Professional development

Company

Two Six Technologies

twittertwitter
company-logo
Two Six Technologies provides cybersecurity and technology solutions for national security customers.

Funding

Current Stage
Late Stage
Total Funding
$42.36M
2023-10-16Series Unknown· $8.73M
2022-04-08Series Unknown· $10M
2021-09-20Series Unknown· $4.75M

Leadership Team

leader-logo
Bob Kwaja
Chief Financial Officer
linkedin
leader-logo
Richard Housley
Chief Scientist, Reverse Engineering
linkedin
Company data provided by crunchbase