At Two Six Technologies, the business problem is to solve the world’s most complex challenges today through unrivaled collaboration and unwavering trust, specifically in the area of vulnerability research to empower the team and support customers in building a safer global future.
Requirements
- Proficiency in C/C++, Python, and at least one ISA (e.g. x86/ARM/MIPS)
- Proficiency in linux command-line environments
- Experience using a decompiler such as IDA Pro, Binary Ninja, or Ghidra
- Experience using vulnerability research tools such as emulators or fuzzers
- Experience using a software debugger such as GDB or WinDbg
- Experience producing technical briefings for operational stakeholders
- Experience with UART, SPI, I2C
Responsibilities
- Identify vulnerabilities and potential attacks across hardware, software, procedures, logistics, and physical security of systems
- Develop proof of concept (PoC) code for identified vulnerabilities
- Reverse-engineer targeted embedded systems to identify vulnerabilities
- Review source-code looking for risks and vulnerabilities
- Analyze the effects of vulnerabilities on mission outcomes and operational effectiveness
- Compare system attack techniques and propose operationally effective countermeasures
- Produce reports, briefings, and perspectives on actual and potential attacks
Other
- Bachelor’s degree and 2 years of relevant experience, OR Associate’s degree and 4 years of relevant experience
- Active TS/SCI clearance with Polygraph required
- Regular on-site support at the Laurel, Maryland customer site
- Relevant experience: computer/information systems design/development, programming, information/cyber/network security, reverse-engineering, vulnerability analysis, penetration testing, computer forensics, information assurance, or systems engineering
- Ability to work in a fast-growing team and collaborate with reverse engineers and security researchers