
Vulnerability Researcher
At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future.
Overview of Opportunity
Join the Wireless Sector at Two Six Technologies, where we push the boundaries of software and firmware reverse engineering to uncover vulnerabilities in wireless and embedded systems. As part of our elite team of security researchers, you’ll work alongside CNO developers and hardware engineers, conducting cutting-edge vulnerability research on complex, real-world targets.
Our government customers rely on us to deliver mission-critical security solutions, and we’re looking for a Vulnerability Researcher who thrives on reverse engineering embedded systems, discovering security weaknesses, and developing innovative proof-of-concept exploits. If you’re passionate about wireless security, embedded firmware analysis, and making an impact on national security, we want you on our team.
What You’ll Do:
- Reverse engineer wireless and embedded systems, identifying vulnerabilities and assessing their security impact.
- Develop proof-of-concept exploits for discovered vulnerabilities following DevOps best practices for keeping code bases organized and maintainable.
- Analyze firmware, software protections, and wireless protocols to uncover security flaws.
- Utilize and develop custom tools to analyze and manipulate software/firmware binaries.
- Collaborate closely with CNO developers, vulnerability researchers, and hardware engineers in a fast-paced, small-team environment.
- Solve complex technical challenges with no predefined solutions.
What You’ll Need (Basic Qualifications):
- Bachelor’s (or higher) degree in Computer Science, Computer/Electrical Engineering, or a related field (or equivalent practical experience).
- 2+ years of experience with programming/scripting languages in C/C++, Python, and Linux command-line environments.
- Experience with reverse engineering and vulnerability research, using tools such as IDA Pro, Binary Ninja, or Ghidra.
- Expertise in one or more of the following:
- Firmware analysis (ARM, MIPS, PowerPC, RTOS).
- Firmware rehosting using emulation tools such as QEMU
- Fuzzing and exploit development.
- Binary obfuscation and anti-analysis techniques.
- Wireless protocols and radio signal analysis.
- File system forensics and fault injection frameworks.
- Knowledge of common network protocols TCP/IP, UDP, or HTTP
Nice if you have (Preferred):
- Experience with defeating modern migrations such as ASLR, DEP, and Stack Canaries
- Knowledge of cellular standards such as 4G or 5G
- Knowledge of low bandwidth communications such as RS485, RS232, CAN
- Knowledge of Wifi, Bluetooth, Zigbee communication
Security Clearance:
- Active US Security clearance of Top Secret level and ability to obtain and maintain TS/SCI
#LI-JK1
#LI-ONSITE
Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We believe in rewarding skills, experience, and performance. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development.
The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements.
Salary Range
$95,700 - $193,900 USD
Apply for this job
*
indicates a required field