Cybersecurity Researcher jobs in United States
cer-icon
Apply on Employer Site
company-logo

Two Six Technologies · 5 hours ago

Cybersecurity Researcher

Two Six Technologies is a company that builds and implements innovative products to tackle complex challenges. They are seeking a Cybersecurity Researcher to conduct vulnerability research on embedded systems, collaborating with developers and engineers to enhance national security through advanced security solutions.

Cyber SecurityInformation TechnologyNetwork Security
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Analyze and solve complex technical challenges with no predefined answers
Perform in-depth reverse engineering to identify vulnerabilities, assess their impact, and transform findings into actionable capabilities
Deconstruct and understand the functionality of intricate technical systems
Navigate ambiguity and independently forge paths toward innovative solutions
Collaborate in a small-team environment, where your contributions will have an outsized impact
Leverage your expertise in digital forensics and watermarking to inform secure development practices and maintain data integrity throughout the product lifecycle
Work on projects as a sole contributor and as part of small teams

Qualification

Vulnerability ResearchReverse EngineeringEmbedded Systems SecurityC/C++ ProgrammingPython ProgrammingDigital ForensicsAssembly Language x86-64Assembly Language ARMAssembly Language MIPSCommon Vulnerability ClassesCommon MitigationsAnti-Debugging TechniquesClient-Facing ExperienceCryptography ConceptsAI TechnologyTechnical Documentation

Required

Bachelor's (or higher) degree in Computer Science, Computer/Electrical Engineering, Mathematics or a related field or 5 years of practical experience
Experience writing both proof-of-concept and production level code and accompanying documentation
Deep understanding and demonstrated experience of computer architecture, operating systems, programming languages and software vulnerabilities
Deep understanding of x86-64, ARM and/or MIPS assembly
Deep understanding of and experience with common vulnerability classes: logic bugs, overflows, etc
Deep understanding of common vulnerability mitigations employed in both hardware and software
Experience of embedded device security and reverse engineering (e.g., ARM, RTOS)
Experience developing, debugging, and scripting in C/C++ and Python within Linux command-line environments, with a strong emphasis on low-level programming, memory management, and system interaction for reverse engineering and vulnerability research
Experience with reverse engineering and vulnerability research, using tools such as IDA/Ghidra, debuggers, etc
Deep understanding of common anti-debugging/analysis techniques
Experience working with embedded devices and hands on experience working with hardware and embedded systems
Active Top Secret clearance with eligibility/willingness to obtain a Top Secret/SCI clearance

Preferred

Knowledge of embedded device security and reverse engineering (e.g., ARM, RTOS)
Familiarity with cryptography concepts and their implementation
Experience with AI enabled technology a plus
Hands-on experience working with hardware and embedded systems
Client-facing experience in technical roles
Prefer active TS/SCI with Poly

Benefits

Medical, dental, and vision insurance
Life and disability insurance
Retirement benefits
Paid leave
Tuition assistance
Professional development

Company

Two Six Technologies

twittertwitter
company-logo
Two Six Technologies provides cybersecurity and technology solutions for national security customers.

Funding

Current Stage
Late Stage
Total Funding
$54.56M
2026-01-05Series Unknown· $10M
2024-01-30Series Unknown· $2.2M
2023-10-16Series Unknown· $8.73M

Leadership Team

leader-logo
Bob Kwaja
Chief Financial Officer
linkedin
leader-logo
Richard Housley
Chief Scientist, Reverse Engineering
linkedin
Company data provided by crunchbase