divh2Principal Vulnerability Researcher/h2pJoin the Exploitation Sector of Two Six Technologies - a team of dedicated hackers in Northern Virginia - where youll provide strategic technical leadership in vulnerability research across hardware, software, and operational domains. Working alongside engineers, researchers, and clients, youll identify vulnerabilities, assess operational impacts, and develop effective countermeasures. Our fast-growing roster of government customers relies on us to deliver advanced security solutions, and were looking for a Principal Vulnerability Researcher to drive research programs and mentor technical teams. This role requires regular on-site support at the Laurel, Maryland customer site./ppWhat you will do:/pulliLead the identification of vulnerabilities and attacks across hardware, software, personnel, logistics, procedures, and physical security, linking them to operational and mission impacts./liliIdentify vulnerabilities and potential attacks across hardware, software, procedures, logistics, and physical security of systems/liliDevelop proof of concept (PoC) code for identified vulnerabilities/liliReverse-engineer targeted embedded systems to identify vulnerabilities/liliReview source code looking for risks and vulnerabilities/liliAnalyze the effects of vulnerabilities on mission outcomes and operational effectiveness./liliCompare system attack techniques and propose operationally effective countermeasures/liliProduce reports, briefings, and perspectives on actual and potential attacks/liliProvide technical leadership on research efforts, prioritizing investigations, reviewing methodologies, and overseeing proof-of-concepts./liliMentor and guide junior engineers and researchers, reviewing technical approaches and fostering skill development./li/ulpWhat you will need (Basic Qualifications):/pulliDoctorate in Computer Science, Computer/Electrical Engineering, or a related field and 7 years of relevant experience, OR Masters degree and 9 years of relevant experience, OR Bachelors degree and 11 years of relevant experience, OR Associates degree and 13 years of relevant experience./liulliRelevant experience: computer/information systems design/development, programming, information/cyber/network security, reverse-engineering, vulnerability analysis, penetration testing, computer forensics, information assurance, or systems engineering/li/ulliProficiency in C/C++, Python, and at least one ISA (e.g. x86/ARM/MIPS)/liliProficiency in Linux command-line environments/liliExperience using a decompiler such as IDA Pro, Binary Ninja, or Ghidra/liliExperience using vulnerability research tools such as emulators or fuzzers/liliExperience using a software debugger such as GDB or WinDbg/liliAbility to work on-site at Laurel, Maryland customer site regularly./li/ulpNice If You Have (Preferred):/pulliExperience translating vulnerabilities into operationally relevant impact assessments and countermeasures./liliExperience producing technical briefings for operational stakeholders/liliExperience using a hardware debugger/liliExperience with UART, SPI, I2C/liliExperience with common secure communications such as TLS or SSH/liliFamiliarity with embedded firmware, RTOS, or networked systems/liliFamiliarity with high-side environments/li/ulpSecurity Clearance:/pulliActive TS/SCI clearance with Polygraph required/li/ulpTwo Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We believe in rewarding skills, experience, and performance. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development. The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements. Salary Range $193,746 - $290,619 USD/p/div
...Job Number: R0230873 Hardware Vulnerability Researcher The Opportunity As an electrical engineer, you understand the workings... .... That knowledge is key when it comes to evaluating hardware security implementation in embedded electronics. We are looking for an...
...Digital Controllership Senior Consultant Step into a role where you'll help shape the future of finance. As part of our Finance Transformation... ...clients to solve their most complex challenges. Leveraging Deloitte's unmatched resources and deep industry insights, you'll...
A leading automotive company is seeking a Senior Software Engineer in Mountain View, CA. This role involves leading the development of advanced vehicle viewing applications and mobility insights. Responsibilities include managing the full software development cycle, collaborating...
...Certified Medical Assistant (MA-C) MultiCare Mary Bridge Children's Hospital is the state-designated Level II Pediatric Trauma Center and the only pediatric hospital in Washington's South Sound Region dedicated to a comprehensive network of health services for children...
...Description CKC Data Solutions in Springfield, MO has the career adventure you've been waiting for! We're hiring 3 Telecom Cable Installers to join our elite team of IT professionals. Job Snapshot: Pay: $35,000 $83,000/year (DOE) Schedule: Full-time, Monday...