Two Six Technologies · 3 months ago
Lead Vulnerability Researcher
Two Six Technologies is a company focused on building innovative products to solve complex challenges. They are seeking a Lead Vulnerability Researcher to lead vulnerability research across hardware, software, and operational systems, providing technical leadership and mentorship while identifying critical vulnerabilities and developing countermeasures.
Cyber SecurityInformation TechnologyNetwork Security
Responsibilities
Lead the identification of vulnerabilities and attacks across hardware, software, personnel, logistics, procedures, and physical security
Develop proof of concept (PoC) code for identified vulnerabilities
Reverse-engineer targeted embedded systems to identify vulnerabilities
Review source code looking for risks and vulnerabilities
Analyze the effects of vulnerabilities on mission outcomes and operational effectiveness
Compare system attack techniques and propose operationally effective countermeasures
Produce reports, briefings, and perspectives on actual and potential attacks
Provide technical leadership on research efforts, prioritizing investigations, reviewing methodologies, and overseeing proof-of-concepts
Mentor and guide junior engineers and researchers, reviewing technical approaches and fostering skill development
Qualification
Required
Doctorate in Computer Science, Computer/Electrical Engineering, or a related field and 4 years of relevant experience, OR Master's degree and 6 years of relevant experience, OR Bachelor's degree and 8 years of relevant experience, OR Associate's degree and 10 years of relevant experience
+ Relevant experience: computer/information systems design/development, programming, information/cyber/network security, reverse-engineering, vulnerability analysis, penetration testing, computer forensics, information assurance, or systems engineering
Proficiency in C/C++, Python, and at least one ISA (e.g. x86/ARM/MIPS)
Proficiency in Linux command-line environments
Experience using a decompiler such as IDA Pro, Binary Ninja, or Ghidra
Experience using vulnerability research tools such as emulators or fuzzers
Experience using a software debugger such as GDB or WinDbg
Ability to work on-site at Laurel, Maryland customer site regularly
Active TS/SCI clearance with Polygraph required
Preferred
Experience translating vulnerabilities into operationally relevant impact assessments and countermeasures
Experience producing client-facing technical briefings for operational stakeholders
Experience using a hardware debugger
Experience with UART, SPI, I2C
Experience with common secure communications such as TLS or SSH
Familiarity with embedded firmware, RTOS, or networked systems
Familiarity with high-side environments
Company
Two Six Technologies
Two Six Technologies provides cybersecurity and technology solutions for national security customers.
Funding
Current Stage
Late StageTotal Funding
$54.56M2026-01-05Series Unknown· $10M
2024-01-30Series Unknown· $2.2M
2023-10-16Series Unknown· $8.73M
Recent News
Bizjournals.com Feed (2025-11-12 15:43:17)
2026-01-11
Two Six Technologies
2025-10-28
Two Six Technologies
2025-09-15
Company data provided by crunchbase