Lead Vulnerability Researcher jobs in United States
cer-icon
Apply on Employer Site
company-logo

Trusted Concepts, Inc. · 2 days ago

Lead Vulnerability Researcher

Two Six Technologies builds innovative products to solve complex challenges. They are seeking a Lead Vulnerability Researcher to guide vulnerability research across hardware, software, and operational systems, providing technical leadership and mentorship to a team of engineers and security researchers.

GamingInformation TechnologySoftwareVideo Games
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Lead the identification of vulnerabilities and attacks across hardware, software, personnel, logistics, procedures, and physical security
Develop proof of concept (PoC) code for identified vulnerabilities
Reverse-engineer targeted embedded systems to identify vulnerabilities
Review source code looking for risks and vulnerabilities
Analyze the effects of vulnerabilities on mission outcomes and operational effectiveness
Compare system attack techniques and propose operationally effective countermeasures
Produce reports, briefings, and perspectives on actual and potential attacks
Provide technical leadership on research efforts, prioritizing investigations, reviewing methodologies, and overseeing proof-of-concepts
Mentor and guide junior engineers and researchers, reviewing technical approaches and fostering skill development

Qualification

Vulnerability analysisReverse-engineeringC/C++PythonLinux command-linePenetration testingSoftware debuggingClient-facing briefingsTechnical leadershipMentorship

Required

Doctorate in Computer Science, Computer/Electrical Engineering, or a related field and 4 years of relevant experience, OR Master's degree and 6 years of relevant experience, OR Bachelor's degree and 8 years of relevant experience, OR Associate's degree and 10 years of relevant experience
Relevant experience: computer/information systems design/development, programming, information/cyber/network security, reverse-engineering, vulnerability analysis, penetration testing, computer forensics, information assurance, or systems engineering
Proficiency in C/C++, Python, and at least one ISA (e.g. x86/ARM/MIPS)
Proficiency in Linux command-line environments
Experience using a decompiler such as IDA Pro, Binary Ninja, or Ghidra
Experience using vulnerability research tools such as emulators or fuzzers
Experience using a software debugger such as GDB or WinDbg
Ability to work on-site at Laurel, Maryland customer site regularly
Active TS/SCI clearance with Polygraph required

Preferred

Experience translating vulnerabilities into operationally relevant impact assessments and countermeasures
Experience producing client-facing technical briefings for operational stakeholders
Experience using a hardware debugger
Experience with UART, SPI, I2C
Experience with common secure communications such as TLS or SSH
Familiarity with embedded firmware, RTOS, or networked systems
Familiarity with high-side environments

Benefits

Medical, dental, and vision insurance
Life and disability insurance
Retirement benefits
Paid leave
Tuition assistance
Professional development

Company

Trusted Concepts, Inc.

twittertwitter
company-logo
Trusted Concepts, Inc. is a computer programming company offering gaming solutions.

Funding

Current Stage
Growth Stage
Total Funding
unknown
2021-08-24Acquired
Company data provided by crunchbase