Two Six Technologies is seeking to identify and exploit vulnerabilities in firmware, applications, and hardware on mobile devices to empower their team and support customers in building a safer global future.
Requirements
- Proven experience in vulnerability research, reverse engineering, and exploit development on mobile platforms (iOS, Android) or their desktop counterparts (macOS, Linux).
- Minimum of 7 years of experience in programming with languages such as C, C++, and Objective C.
- Proficiency in at least one Assembly language (e.g., x86/64, ARM/64, MIPS).
- Expertise in using disassemblers/decompilers and reverse engineering tools like IDA Pro, Ghidra, Hopper, or Binary Ninja.
- Experience with modern scripting languages such as Python.
- Knowledge of Bluetooth, Wi-Fi, or cellular internals and their interactions with mobile devices.
- Familiarity with methods to bypass exploit mitigations and detection techniques.
Responsibilities
- Vulnerability Identification and Exploitation: Identify and exploit vulnerabilities such as memory corruption through stack overflows, heap overflows, integer overflows, and logical flaws.
- Exploit Mitigation Bypass: Overcome mitigations like ASLR, code signing, non-executable memory protections, and sandboxing.
- Technique Enhancement: Refine and combine exploitation techniques to assess severity.
- Automation: Automate the identification of vulnerabilities, triggering mechanisms, and optimization of exploits.
- Technical Leadership: Provide technical and functional direction, developing and implementing techniques to ensure customer satisfaction.
Other
- Active Top Secret Clearance.
- BS Degree in Computer Science or related technical fields.
- Client Interaction: Experience in a client-facing technical role.
- Travel requirements not specified
- Education: BS Degree in Computer Science or related technical fields.