Vulnerability Researcher
At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future.
Overview of Opportunity
Join the Exploitation Sector of Two Six Technologies—a team of dedicated hackers in Arlington, Virginia—where you’ll immerse yourself in cutting-edge Vulnerability Research on a wide range of unique embedded systems. Working side by side with top-tier CNO developers and hardware engineers, you’ll discover vulnerabilities and create proof of concepts on embedded systems. Our fast-growing roster of government customers relies on us to deliver advanced security solutions, and we’re looking for a Vulnerability Researcher to help us continue pushing boundaries. If you’re passionate about building tools that make a tangible impact on national security, we want you on our team.
What you will do:
- Analyze and solve complex technical challenges with no predefined answers.
- Perform in-depth reverse engineering to identify vulnerabilities, assess their impact, and transform findings into actionable capabilities.
- Deconstruct and understand the functionality of intricate technical systems.
- Navigate ambiguity and independently forge paths toward innovative solutions.
- Collaborate in a small-team environment, where your contributions will have an outsized impact.
- Leverage your expertise in digital forensics and watermarking to inform secure development practices and maintain data integrity throughout the product lifecycle.
What you will need (Basic Qualifications):
- Bachelor’s (or higher) degree in computer science, engineering, or a related field (solid knowledge in data structures and algorithms may substitute for a specific degree)
- Experience with programming/scripting languages in C, Python and the *nix command line
- Familiarity with reverse engineering principles and disassemblers (e.g., Binary Ninja, Ghidra, IDA)
- Minimum of 3 years of experience utilizing cybersecurity principles and a strong interest in learning more
- Active Top Secret clearance with eligibility/willingness to obtain a Top Secret/SCI clearance
Nice to have (Preferred):
- Experience scripting with the Binary Ninja API or Ghidra.
- Experience with other languages (e.g. Go, Rust)
- Knowledge of embedded device security and reverse engineering (e.g., ARM, RTOS).
- Familiarity with cryptography concepts and their implementation.
- Hands-on experience working with hardware and embedded systems.
- Prefer active TS/SCI with Poly
Security Clearance:
- Active Top Secret clearance with eligibility/willingness to obtain a Top Secret/SCI clearance.
#LI-JK1
#LI-ONSITE
Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We believe in rewarding skills, experience, and performance. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development.
The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements.
Salary Range
$95,700 - $193,900 USD
Apply for this job
*
indicates a required field