Listing Description
Two Six Technologies is seeking an experienced Cybersecurity Researcher to support our programs at our Arlington, Virginia headquarters. This role is technical at its core – along with in-depth reverse engineering and exploit development you will transition those findings into capabilities.
Job Responsibilities & Duties
- Given the technical nature of this role, experience in computer science, computer engineering, or a similar field is required. Significant proven experience in reverse engineering (RE) or vulnerability research (VR) can show your fit even if your background is outside of one of these fields.
- You should be comfortable taking on complex technical problems for which there is often no known answer.
- You should be comfortable with ambiguity and forging your own path; our small team setting will provide you opportunity for outsized impact.
- While you will receive extensive training, mentorship, and coaching, you must be comfortable executing against goals independently since there’s no playbook for breaking unique complex systems.
Qualifications & Skills- Required:
- Bachelor’s (or higher) degree in computer science, engineering, or a related field (solid knowledge in RE or VR may substitute for a specific degree)
- Minimum 3 years of experience in firmware development using low-level programming languages (C and at least one assembly language), scripting languages (e.g., Python), and the *nix command line
- Minimum 3 years of experience with common disassemblers/decompilers and reverse engineering tools (IDA, Ghidra, Binary Ninja)
- Active US Security clearance of Top Secret level and ability to obtain and maintain SCI
Nice to have, but not expected:
- Experience with firmware/driver development across Linux and Windows OS’es
- Strong familiarity with cybersecurity principles and telecommunication systems (4G, 5G), sub-GHz wireless, 802.11, 802.15, and IoT devices
- Strong familiarity with cybersecurity principles and a strong interest in providing guidance to program staff
- Experience with software reverse engineering concepts: static analysis, dynamic analysis, fuzzing techniques
- Familiarity with building or securing embedded devices, other digital systems, and embedded binary reverse engineering (ARM, RTOS, etc.)
- Familiarity with basic cryptography design and implementation concepts
Clearance Requirements:
- Active US Security clearance of Top Secret level and ability to obtain and maintain SCI
#LI-AB1
#LI-Onsite
Listing Details
- Citizenship: Not Provided
- Incentives: Not Provided
- Education: Not Provided
- Travel: Not Provided
- Telework: Not Provided