Senior CNO Developer

Arlington , United States

TLDR

Join a small, highly collaborative team to develop custom software tools and capabilities for advanced telecommunications and cyber research, solving complex technical challenges.

At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future.

Overview of Opportunity 

Two Six Technologies is seeking a Senior CNO Developer to join our Trusted Electronics and Effects team supporting an advanced telecommunications research and cyber capability development program.

This is a full-time, in-office position based in our Arlington, Virginia office, where close collaboration across reverse engineering, vulnerability research, and hardware teams is critical to mission success.

This program has conducted deep technical research into telecommunications access mechanisms within defined systems, identifying novel methods that enable system access without traditional interaction. The team is now focused on leveraging that research to perform advanced reverse engineering and vulnerability research, as well as to develop operational tools and capabilities that can be deployed in complex, real-world environments.

In this role, you will work alongside reverse engineers and vulnerability researchers to transform cutting-edge research into mission-ready cyber capabilities. You will be part of a small, highly collaborative team building custom software tools and evolving innovative proofs-of-concept into robust operational solutions.

What You Will Do:

  • Design and develop custom tools and software targeting embedded and telecommunications systems
  • Serve as a cyber capability developer on a small, highly motivated team
  • Develop proofs-of-concept from discovered vulnerabilities and transition them into robust, maintainable codebases following DevOps best practices
  • Analyze firmware, software protections, operating system internals, and wireless protocols to uncover exploitable security flaws
  • Conduct reverse engineering and vulnerability research against complex Linux-based and embedded systems
  • Utilize and extend custom tools to analyze and manipulate software/firmware binaries
  • Develop capabilities that leverage novel telecommunications access mechanisms
  • Collaborate closely with developers, vulnerability researchers, and hardware engineers in a fast-paced environment
  • Solve complex, ambiguous technical challenges with limited prior experience
  • Engage in technical discussions with transition partners and mission stakeholders

What You Will Need (Minimum Qualifications):

  • Bachelor’s degree in Computer Science, Computer/Electrical Engineering, or related scientific discipline
  • Minimum 5 years of experience designing and/or prototyping applications using agile software development processes
  • Minimum 2 years of experience with one or more of the following: Python, C, C++
  • Minimum 2 years of experience with operating system internals (privilege models, user groups, binary memory layout)
  • At least 2 years of experience with network socket programming and expert packet-level understanding of IP, TCP, and related application-level protocols
  • At least 2 years of experience with reverse engineering x86/ARM binaries or embedded systems
  • Experience tracing code execution in debuggers (WinDbg, GDB, or equivalent)
  • Expertise in one or more of the following areas:
    • Firmware analysis (ARM, RTOS, or similar)
    • Fuzzing and exploit development
    • Wireless protocols through Wireshark
    • File system forensics and fault injection frameworks
    • Scripting with Binary Ninja or Ghidra
    • Binary Ninja API or Ghidra
  • Active U.S. Top Secret security clearance with ability to obtain and maintain SCI access

Nice to Have (Preferred Qualifications):

  • Familiarity with identifying and analyzing vulnerabilities in complex applications
    Knowledge of memory protection mechanisms (ASLR, DEP, etc.)
  • Experience with CI/CD pipelines and virtualized test ranges
  • Experience with firmware or driver development across Linux, Windows, or embedded systems
  • Strong understanding of memory management (heap, stack, virtual memory, MMU, physical vs. virtual addressing)
  • Experience working with telecommunications systems, including protocol analysis, access mechanisms, or infrastructure components (5G experience a plus)
  • Graduate degree in Computer Science, Computer/Electrical Engineering, or related field

Clearance Requirements:

  • Active U.S. Security clearance of Top Secret level with the ability to obtain/maintain SCI

#LI-JK1

#LI-ONSITE

Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We believe in rewarding skills, experience, and performance. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development.

The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements.

Salary Range
$143,763$215,644 USD

Two Six Technologies specializes in cybersecurity and advanced technology solutions tailored for national security. We create innovative products like Sigma and Trusted Keep that tackle today’s most challenging issues, ensuring a safer global future for our clients.

View all jobs
Salary
$143,763 – $215,644 per year
Ace your job interview

Understand the required skills and qualifications, anticipate the questions you may be asked, and study well-prepared answers using our sample responses.

Developer Q&A's
Report this job
Apply for this job