2026 PhD Graduate – Vulnerability Researcher – Offensive Cyber Capabilities jobs in United States
cer-icon
Apply on Employer Site
company-logo

Johns Hopkins Applied Physics Laboratory · 4 months ago

2026 PhD Graduate – Vulnerability Researcher – Offensive Cyber Capabilities

Johns Hopkins Applied Physics Laboratory (APL) is dedicated to solving complex challenges in defense, security, space, and science. They are seeking a Vulnerability Researcher who will create and use cutting-edge techniques for automating reverse engineering and vulnerability analysis while collaborating with government sponsors to build mission-aligned capabilities.

EducationUniversities
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Create and use cutting-edge techniques for automating reverse engineering and vulnerability analysis
Cultivate deep technical expertise of software, firmware, and hardware platforms
Develop exploits against bespoke embedded systems
Collaborate with government sponsors and operators to build mission-aligned capabilities
Deepen your expertise by working with reverse engineering experts
Widen your expertise by engaging with experts in other fields as you tackle problems intersecting other technical domains
Present research to team members, APL management, government decision makers, and the larger cybersecurity community in academia and industry

Qualification

Vulnerability analysisReverse engineeringEmbedded systemsProgramming languagesDebuggersToolsUnix/LinuxSoft skills

Required

Are graduating with a PhD in Computer Engineering, Computer Science, Electrical Engineering, or a related field
Have an excellent academic record with demonstrated mastery of fundamental topics such as computer architecture, operating systems, and data structures
Are proficient with one or more programming languages
Love solving puzzles and are excited to learn new tools, platforms, and programming languages
Are able to obtain an Interim Top Secret security clearance by your start date and can ultimately obtain a TS/SCI with polygraph clearance. If selected, you will be subject to a government security clearance investigation and must meet the requirements for access to classified information; eligibility requirements include U.S. citizenship

Preferred

Have an existing portfolio of research related to vulnerability analysis
Are experienced using debuggers and reverse engineering tools such as Ghidra
Are familiar with assembly
Participate in hackathons, CTFs, or other relevant cybersecurity activities
Understand Unix/Linux operating systems and embedded systems development toolchains
Have experience with hardware debugging interfaces, code security mechanisms and their weaknesses, hardware diagnostic tools, and signal/protocol analysis
Possess an active TS/SCI clearance with full scope polygraph

Benefits

Generous benefits
Robust education assistance program
Unparalleled retirement contributions
Healthy work/life balance
Comprehensive benefits package including retirement plans, paid time off, medical, dental, vision, life insurance, short-term disability, long-term disability, flexible spending accounts, education assistance, and training and development

Company

Johns Hopkins Applied Physics Laboratory

twittertwittertwitter
company-logo
The Johns Hopkins Applied Physics Laboratory (APL) is a not-for-profit university-affiliated research center (UARC) that provides solutions to complex national security and scientific challenges with technical expertise and prototyping, research and development, and analysis.

Funding

Current Stage
Late Stage
Total Funding
unknown
Key Investors
U.S. Department of Homeland Security
2023-01-17Grant

Leadership Team

leader-logo
Alice Bowman
Mission Operations Manager
linkedin
leader-logo
Ashutosh Dutta
Chief 5G Strategist, Senior Scientist, Lawrence R. Hafstad Fellow, Director at JHU
linkedin
Company data provided by crunchbase