Senior Vulnerability Researcher jobs in United States
cer-icon
Apply on Employer Site
company-logo

Two Six Technologies · 5 hours ago

Senior Vulnerability Researcher

Two Six Technologies is committed to building innovative products that tackle complex challenges. The Senior Vulnerability Researcher will engage in reverse engineering and vulnerability research, identifying vulnerabilities and analyzing attack vectors on critical systems.

Cyber SecurityInformation TechnologyNetwork Security
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Identify vulnerabilities and potential attacks across hardware, software, procedures, logistics, and physical security of systems
Develop proof of concept (PoC) code for identified vulnerabilities
Reverse-engineer targeted embedded systems to identify vulnerabilities
Review source code looking for risks and vulnerabilities
Analyze the effects of vulnerabilities on mission outcomes and operational effectiveness
Compare system attack techniques and propose operationally effective countermeasures
Produce reports, briefings, and perspectives on actual and potential attacks
Mentor junior engineers and analysts, reviewing technical approaches and guiding research methodology

Qualification

Vulnerability analysisReverse engineeringC/C++ proficiencyPython proficiencyLinux command-lineDecompilers IDA ProDecompilers GhidraVulnerability research toolsSoftware debugging GDBSoftware debugging WinDbgTechnical briefingsHardware debuggingUARTSPII2CSecure communications TLSSecure communications SSHEmbedded firmware familiarityRTOS familiarityNetworked systems familiarityHigh-side environments familiarityMentoring

Required

Bachelor's degree and 5 years of relevant experience, OR Associate's degree and 7 years of relevant experience
Relevant experience: computer/information systems design/development, programming, information/cyber/network security, reverse-engineering, vulnerability analysis, penetration testing, computer forensics, information assurance, or systems engineering
Proficiency in C/C++, Python, and at least one ISA (e.g. x86/ARM/MIPS)
Proficiency in Linux command-line environments
Experience using a decompiler such as IDA Pro, Binary Ninja, or Ghidra
Experience using vulnerability research tools such as emulators or fuzzers
Experience using a software debugger such as GDB or WinDbg
Ability to work on-site at the Laurel, Maryland customer site regularly
Active TS/SCI clearance with Polygraph required

Preferred

Experience producing technical briefings for operational stakeholders
Experience using a hardware debugger
Experience with UART, SPI, I2C
Experience with common secure communications such as TLS or SSH
Familiarity with embedded firmware, RTOS, or networked systems
Familiarity with high-side environments

Benefits

Medical, dental, and vision insurance
Life and disability insurance
Retirement benefits
Paid leave
Tuition assistance
Professional development

Company

Two Six Technologies

twittertwitter
company-logo
Two Six Technologies provides cybersecurity and technology solutions for national security customers.

Funding

Current Stage
Late Stage
Total Funding
$54.56M
2026-01-05Series Unknown· $10M
2024-01-30Series Unknown· $2.2M
2023-10-16Series Unknown· $8.73M

Leadership Team

leader-logo
Bob Kwaja
Chief Financial Officer
linkedin
leader-logo
Richard Housley
Chief Scientist, Reverse Engineering
linkedin
Company data provided by crunchbase