Two Six Technologies is hiring a

Senior Exploitation Vulnerability Researcher

Arlington, United States

At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future.

Overview of Opportunity:

The Exploitation Sector of Two Six Technologies is a team of hackers passionate about solving the nation’s most important cybersecurity challenges. We do hard target VR on a variety of embedded systems, engage with CNO developers and hardware engineers to productize proof of concepts (POCs) into capabilities, and work with a growing list of government customers who utilize our products. We’re looking to add a Senior Vulnerability Researcher to our team working out of our headquarters in Arlington, Virginia.

What you will do:

  • Perform static and dynamic analysis to discover vulnerabilities in a variety of systems
  • Develop and weaponize POCs into full exploits
  • Collaborate with other disciplines to deliver solutions to our customers
  • Provide technical direction to junior engineers and researchers
  • Present findings and capabilities to customer leadership

What you have done:

  • Knowledge of *nix operating systems 
  • Proficiency with at least one modern debugger such as GDB or WinDBG 
  • Proficiency in at least one modern decompiler such as Ghidra, IDA, or Binary Ninja 
  • Proficiency in at least one compiled programming language such as C or C++ 
  • Proficiency in at least one scripting language such as Python 
  • Proficiency in at least one assembly language such as x86 or ARM
  • Experience with defeating modern migrations such as ASLR, DEP, and Stack Canaries

Nice to have:

  • Bachelor’s Degree in Electrical Engineering, Computer Engineering, Computer Science, or related field
  • Experience conducting vulnerability research on embedded systems
  • Experience building fuzzing and emulation tools
  • Knowledge of common network protocols such as TCP/IP, UDP, or HTTP 
  • Knowledge of low bandwidth communications such as RS485, RS232, CAN

Security Clearance:

  • Active US Top Secret Security Clearance and ability to obtain and maintain TS/SCI

#LI-ZS1

#LI-ONSITE

Apply for this job

Please mention you found this job on AI Jobs. It helps us get more startups to hire on our site. Thanks and good luck!

Get hired quicker

Be the first to apply. Receive an email whenever similar jobs are posted.

Ace your job interview

Understand the required skills and qualifications, anticipate the questions you may be asked, and study well-prepared answers using our sample responses.

Researcher Q&A's
Report this job
Apply for this job