Two Six Technologies is looking for a Vulnerability Researcher to join their Exploitation Sector in Arlington, Virginia, to perform cutting-edge Vulnerability Research on unique embedded systems and create proof of concepts for government customers.
Requirements
- Experience with programming/scripting languages in C, Python and the *nix command line
- Familiarity with reverse engineering principles and disassemblers (e.g., Binary Ninja, Ghidra, IDA)
- Minimum of 3 years of experience utilizing cybersecurity principles and a strong interest in learning more
- Experience scripting with the Binary Ninja API or Ghidra.
- Experience with other languages (e.g. Go, Rust)
- Knowledge of embedded device security and reverse engineering (e.g., ARM, RTOS).
- Familiarity with cryptography concepts and their implementation.
Responsibilities
- Analyze and solve complex technical challenges with no predefined answers.
- Perform in-depth reverse engineering to identify vulnerabilities, assess their impact, and transform findings into actionable capabilities.
- Deconstruct and understand the functionality of intricate technical systems.
- Navigate ambiguity and independently forge paths toward innovative solutions.
- Collaborate in a small-team environment, where your contributions will have an outsized impact.
- Leverage your expertise in digital forensics and watermarking to inform secure development practices and maintain data integrity throughout the product lifecycle.
Other
- Active Top Secret clearance with eligibility/willingness to obtain a Top Secret/SCI clearance.
- Ability to work in the Arlington, Virginia office daily
- Prefer active TS/SCI with Poly
- Bachelor’s (or higher) degree in computer science, engineering, or a related field (solid knowledge in data structures and algorithms may substitute for a specific degree)
- Hands-on experience working with hardware and embedded systems.