Two Six Technologies logoTwo Six Technologies logo

Vulnerability Researcher at Two Six Technologies | Dayton, Ohio

On-site Full-time $97K/yr - $145.6K/yr

Clicking Apply Now takes you to AutoApply where you can tailor your resume and apply.


Experience Level

Experience

Qualifications

What You Will Do:Conduct targeted reverse engineering on diverse embedded systems and software components. Perform static and dynamic analysis to uncover security vulnerabilities under the mentorship of senior technical leads. Develop and enhance proof-of-concept (PoC) capabilities to showcase research advancements and the implications of identified vulnerabilities. Contribute to technical documentation and reports to bolster the team's collective insight into complex targets. Collaborate with cross-functional teams to transform research insights into actionable customer solutions. What You Will Need (Basic Qualifications):Bachelor’s Degree in Electrical Engineering, Computer Engineering, Computer Science, or a related discipline.2–5 years of experience in cybersecurity research, vulnerability research, or reverse engineering. Expertise in at least one modern decompiler (Ghidra, IDA Pro, or Binary Ninja). Proficiency in at least one modern debugger (GDB or WinDBG). Fluency in at least one native programming language (C or C++) and a scripting language (Python). Understanding of *nix operating systems and common networking protocols (TCP/IP, UDP, HTTP). Security Clearance: Active US Secret-level clearance with the capacity to acquire and maintain TS/SCI.

About the job

At Two Six Technologies, we create, deploy, and implement groundbreaking products that tackle the world's most intricate challenges. Through unparalleled collaboration and steadfast trust, we expand the horizons of what is achievable to empower our team and assist our clients in forging a safer global future.

Overview of Opportunity:

Become a pivotal member of the Trusted Electronics & Effects team at Two Six Technologies in Dayton, Ohio, where we redefine software and firmware reverse engineering to unveil vulnerabilities in wireless and embedded systems. As a Vulnerability Researcher, you will be a significant technical contributor within our distinguished team of security researchers, CNO developers, and hardware engineers.

Our government clients depend on us to deliver essential security solutions. We seek a researcher who is eager to take charge of technical tasks, transition from theory to impactful discoveries, and excel in a setting dedicated to reverse engineering embedded systems and developing proof-of-concept exploits.

About Two Six Technologies

Two Six Technologies is at the forefront of innovation, creating solutions to complex problems faced by government and commercial clients. Our commitment to collaboration and excellence empowers our team to deliver cutting-edge technology that enhances national security and promotes a safer world.

Similar jobs

Browse all companies, explore by city & role, or SEO search pages. View directory listings: all jobs, search results, location & role pages.

Tailoring 0 resumes

We'll move completed jobs to Ready to Apply automatically.