Listing Description
Two Six Technologies is seeking a Android Wireless Security Researcher to support our growing Mobile Systems team in Arlington, Virginia. The candidate will join a team of vulnerability researchers, reverse engineers, and exploit developers to perform advanced security research on applications and operating systems on mobile devices.
Ideal candidates will understand the lifecycle of security bugs from when they are introduced into source code, shipped to end users, reported to developers, and finally patched. Candidates should be excited about digging into new systems and learning the complex interactions that can lead to software exploitation.
Responsibilities & Duties:
- Given the technical nature of this role, experience in computer science, computer engineering, or a similar field is required. Significant proven experience in reverse engineering (RE) or vulnerability research (VR) can show your fit even if your background is outside of one of these fields.
- You should be comfortable taking on complex technical problems for which there is often no known answer.
- You should be comfortable with ambiguity and forging your own path; our small team setting will provide you opportunity for outsized impact.
- While you will receive extensive training, mentorship, and coaching, you must be comfortable executing against goals independently since there’s no playbook for breaking unique complex systems.
Minimum Qualifications:
- BS Degree in Computer Science or related technical areas (strong knowledge and relevant experience may substitute for specific degree)
- Experience with software development using low-level programming languages (C and at least one assembly language), scripting languages (e.g., Python), and the *nix command line
- Experience with common disassemblers/decompilers and reverse engineering tools (IDA, Ghidra, Binary Ninja)
- Experience with software reverse engineering concepts: static analysis, dynamic analysis, fuzzing techniques
- Experience performing vulnerability research, including attack surface triage, finding vulnerabilities, and developing proofs of concept to demonstrate security impact
- Active Secret clearance with eligibility/willingness to obtain a Top Secret clearance
Nice If You Have:
- Experience with Android operating system internals and modern security exploitation
- Knowledge of modern web browser internals and security
- Knowledge of wireless (including Bluetooth, Wi-Fi, or cellular) communications internals and interactions with mobile devices
- Familiarity with IDA Pro, Binary Ninja, or Ghidra scripting
- Familiarity with basic cryptography design and implementation concepts
- Active US Security clearance of Top Secret level and ability to obtain and maintain TS/SCI
#LI-ZS1
#LI-ONSITE
Listing Details
- Citizenship: Not Provided
- Incentives: Not Provided
- Education: Not Provided
- Travel: Not Provided
- Telework: Not Provided