Lead Vulnerability Researcher jobs in United States
cer-icon
Apply on Employer Site
company-logo

Two Six Technologies · 3 months ago

Lead Vulnerability Researcher

Two Six Technologies is a company focused on building innovative products to solve complex challenges. They are seeking a Lead Vulnerability Researcher to lead vulnerability research across hardware, software, and operational systems, providing technical leadership and mentorship while identifying critical vulnerabilities and developing countermeasures.

Cyber SecurityInformation TechnologyNetwork Security
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Lead the identification of vulnerabilities and attacks across hardware, software, personnel, logistics, procedures, and physical security
Develop proof of concept (PoC) code for identified vulnerabilities
Reverse-engineer targeted embedded systems to identify vulnerabilities
Review source code looking for risks and vulnerabilities
Analyze the effects of vulnerabilities on mission outcomes and operational effectiveness
Compare system attack techniques and propose operationally effective countermeasures
Produce reports, briefings, and perspectives on actual and potential attacks
Provide technical leadership on research efforts, prioritizing investigations, reviewing methodologies, and overseeing proof-of-concepts
Mentor and guide junior engineers and researchers, reviewing technical approaches and fostering skill development

Qualification

Vulnerability analysisReverse-engineeringC/C++PythonLinux command-linePenetration testingDecompilersVulnerability research toolsSoftware debuggingOperational impact assessmentsClient-facing briefingsEmbedded systemsSecure communicationsTechnical leadershipMentorship

Required

Doctorate in Computer Science, Computer/Electrical Engineering, or a related field and 4 years of relevant experience, OR Master's degree and 6 years of relevant experience, OR Bachelor's degree and 8 years of relevant experience, OR Associate's degree and 10 years of relevant experience
+ Relevant experience: computer/information systems design/development, programming, information/cyber/network security, reverse-engineering, vulnerability analysis, penetration testing, computer forensics, information assurance, or systems engineering
Proficiency in C/C++, Python, and at least one ISA (e.g. x86/ARM/MIPS)
Proficiency in Linux command-line environments
Experience using a decompiler such as IDA Pro, Binary Ninja, or Ghidra
Experience using vulnerability research tools such as emulators or fuzzers
Experience using a software debugger such as GDB or WinDbg
Ability to work on-site at Laurel, Maryland customer site regularly
Active TS/SCI clearance with Polygraph required

Preferred

Experience translating vulnerabilities into operationally relevant impact assessments and countermeasures
Experience producing client-facing technical briefings for operational stakeholders
Experience using a hardware debugger
Experience with UART, SPI, I2C
Experience with common secure communications such as TLS or SSH
Familiarity with embedded firmware, RTOS, or networked systems
Familiarity with high-side environments

Company

Two Six Technologies

twittertwitter
company-logo
Two Six Technologies provides cybersecurity and technology solutions for national security customers.

Funding

Current Stage
Late Stage
Total Funding
$54.56M
2026-01-05Series Unknown· $10M
2024-01-30Series Unknown· $2.2M
2023-10-16Series Unknown· $8.73M

Leadership Team

leader-logo
Bob Kwaja
Chief Financial Officer
linkedin
leader-logo
Richard Housley
Chief Scientist, Reverse Engineering
linkedin
Company data provided by crunchbase