At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future.
Overview of Opportunity:
Two Six Technologies is seeking a Vulnerability Researcher to support our growing team in Dayton, Ohio. The team is composed of intellectual individuals, passionate about cybersecurity research. The team is growing and looking for someone with a reverse engineering and vulnerability research background who understands how to transition those findings into capabilities to support national security missions. The team wants to talk to you if you are actively performing in-depth Linux-based reverse engineering!
Responsibilities:
- Conduct comprehensive reverse engineering on a variety of embedded systems
- Perform static and dynamic analysis to find security vulnerabilities in embedded systems
- Develop proof of concept capabilities to show research progress
- Document research findings to further the team’s understanding of embedded systems
- Collaborate with other disciplines to deliver solutions to our customers
Qualifications & Skills:
- Bachelor’s Degree in Electrical Engineering, Computer Engineering, Computer Science, or related field
- Knowledge of *nix operating systems
- Knowledge of common network protocols TCP/IP, UDP, or HTTP
- Proficiency with at least one modern debugger such as GDB or WinDBG
- Proficiency in at least one modern decompiler such as Ghidra, IDA, or Binary Ninja
- Proficiency in at least one native programming language such as C or C++
- Proficiency in at least one scripting language such as Python
- Proficiency in at least one assembly language such as x86 or ARM
- Active US Security clearance of Top Secret level and ability to obtain and maintain TS/SCI
Nice to have:
- Experience conducting vulnerability research on embedded systems
- Experience with defeating modern migrations such as ASLR, DEP, and Stack Canaries
- Knowledge of cellular standards such as 4G or 5G
- Knowledge of low bandwidth communications such as RS485, RS232, CAN
- Knowledge of Wifi, Bluetooth, Zigbee communication
Clearance Requirements:
- Active US Security clearance of Top Secret level and ability to obtain and maintain TS/SCI
#LI-ZS1
#LI-ONSITE