Job Board
LogoLogo

Get Jobs Tailored to Your Resume

Filtr uses AI to scan 1000+ jobs and finds postings that perfectly matches your resume

Two Six Technologies Logo

Vulnerability Researcher

Two Six Technologies

$122,422 - $183,633
Sep 25, 2025
Laurel, MD, US
Apply Now

At Two Six Technologies, the business problem is to solve the world’s most complex challenges today through unrivaled collaboration and unwavering trust, specifically in the area of vulnerability research to empower the team and support customers in building a safer global future.

Requirements

  • Proficiency in C/C++, Python, and at least one ISA (e.g. x86/ARM/MIPS)
  • Proficiency in linux command-line environments
  • Experience using a decompiler such as IDA Pro, Binary Ninja, or Ghidra
  • Experience using vulnerability research tools such as emulators or fuzzers
  • Experience using a software debugger such as GDB or WinDbg
  • Experience producing technical briefings for operational stakeholders
  • Experience with UART, SPI, I2C

Responsibilities

  • Identify vulnerabilities and potential attacks across hardware, software, procedures, logistics, and physical security of systems
  • Develop proof of concept (PoC) code for identified vulnerabilities
  • Reverse-engineer targeted embedded systems to identify vulnerabilities
  • Review source-code looking for risks and vulnerabilities
  • Analyze the effects of vulnerabilities on mission outcomes and operational effectiveness
  • Compare system attack techniques and propose operationally effective countermeasures
  • Produce reports, briefings, and perspectives on actual and potential attacks

Other

  • Bachelor’s degree and 2 years of relevant experience, OR Associate’s degree and 4 years of relevant experience
  • Active TS/SCI clearance with Polygraph required
  • Regular on-site support at the Laurel, Maryland customer site
  • Relevant experience: computer/information systems design/development, programming, information/cyber/network security, reverse-engineering, vulnerability analysis, penetration testing, computer forensics, information assurance, or systems engineering
  • Ability to work in a fast-growing team and collaborate with reverse engineers and security researchers