Two Six Technologies is looking for a Lead Software Reverse Engineer to push the boundaries of software and firmware reverse engineering to uncover vulnerabilities in wireless and embedded systems for their government customers.
Requirements
- 7+ years of experience with programming/scripting languages in C/C++, Python, and Linux command-line environments.
- Experience with reverse engineering and vulnerability research, using tools such as IDA Pro, Binary Ninja, or Ghidra.
- Expertise in Firmware analysis (ARM, MIPS, PowerPC, RTOS).
- Expertise in Firmware rehosting using emulation tools such as QEMU
- Expertise in Fuzzing and exploit development.
- Expertise in Binary obfuscation and anti-analysis techniques.
- Expertise in Wireless protocols and radio signal analysis.
Responsibilities
- Reverse engineer wireless and embedded systems, identifying vulnerabilities and assessing their security impact.
- Develop proof-of-concept exploits for discovered vulnerabilities following DevOps best practices for keeping code bases organized and maintainable.
- Analyze firmware, software protections, and wireless protocols to uncover security flaws.
- Utilize and develop custom tools to analyze and manipulate software/firmware binaries.
- Collaborate closely with CNO developers, vulnerability researchers, and hardware engineers in a fast-paced, small-team environment.
- Solve complex technical challenges with no predefined solutions.
Other
- Bachelor’s (or higher) degree in Computer Science, Computer/Electrical Engineering, or a related field (or equivalent practical experience).
- Previous experience in a client-facing technical role
- Experience leading a team of engineers and researchers
- Experience scripting with Binary Ninja API or Ghidra.
- Experience in embedded software development using C/C++ for RTOS or Linux environments.
- Knowledge of cryptographic security and secure boot mechanisms.
- Hands-on experience working with hardware debugging tools, JTAG/SWD, or software-defined radio (SDR) frameworks.
- Familiarity with digital signal processing, wireless security protocols, RF signal processing, and side-channel analysis.
- Active TS/SCI with Polygraph preferred.
- Active Top Secret clearance required with eligibility/willingness to obtain a TS/SCI.