- Страна
- США
- Зарплата
- 154 800 $ – 193 500 $
Откликайтесь
на вакансии с ИИ

Cleared Vulnerability Research Engineer
Высокая оценка обусловлена престижем компании Bugcrowd, конкурентной заработной платой и возможностью работать над уникальными задачами на стыке науки и ИБ. Ограничением является требование к высокому уровню допуска.
Сложность вакансии
Роль требует исключительных навыков в реверс-инжиниринге, разработке эксплейтов и знании микроархитектуры. Дополнительную сложность накладывает необходимость наличия допуска TS/SCI и готовность к командировкам на закрытые объекты.
Анализ зарплаты
Предложенный диапазон ($154,800 - $193,500) полностью соответствует рыночным стандартам США для инженеров по поиску уязвимостей с допуском TS/SCI, который традиционно оплачивается выше стандартных ролей.
Сопроводительное письмо
I am writing to express my strong interest in the Cleared Vulnerability Research Engineer position at Bugcrowd. With extensive experience in low-level reverse engineering and exploit development across x86-64 and ARM64 architectures, I have a proven track record of discovering novel vulnerabilities in complex software systems. My technical proficiency with tools like Ghidra and Binary Ninja, combined with a deep understanding of memory corruption primitives such as Use-after-free and Type confusion, aligns perfectly with the technical rigors of this role.
Throughout my career, I have excelled in environments that require high degrees of autonomy and the ability to translate abstract mission objectives into functional technical capabilities. Holding a TS/SCI clearance, I am fully prepared to support Bugcrowd’s mission in cleared spaces and contribute to the development of the Security Knowledge Platform™. I am particularly drawn to Bugcrowd’s culture of ingenuity and look forward to the opportunity to apply my fuzzing and manual analysis skills to stay ahead of evolving threat actors.
Составьте идеальное письмо к вакансии с ИИ-агентом

Откликнитесь в bugcrowd уже сейчас
Присоединяйтесь к элите ИБ-исследователей Bugcrowd и создавайте эксплейты нового поколения для защиты сложнейших систем!
Описание вакансии
We are Bugcrowd. Since 2012, we’ve been empowering organizations to take back control and stay ahead of threat actors by uniting the collective ingenuity and expertise of our customers and trusted alliance of elite hackers, with our patented data and AI-powered Security Knowledge Platform™. Our network of hackers brings diverse expertise to uncover hidden weaknesses, adapting swiftly to evolving threats, even against zero-day exploits. With unmatched scalability and adaptability, our data and AI-driven CrowdMatch™ technology in our platform finds the perfect talent for your unique fight. We aim to create a new era of modern crowdsourced security that outpaces threat actors. Unleash the ingenuity of the hacker community with Bugcrowd, visit www.bugcrowd.com. Based in San Francisco and New Hampshire, Bugcrowd is supported by General Catalyst, Rally Ventures, Costanoa Ventures, and others.
Job Summary
This role is focused on end-to-end exploit development for real-world targets. The specialist will design, develop, and validate novel vulnerability discovery and exploitation capabilities against complex software and systems. Work is conducted at the operating system, binary, and micro-architectural levels, with a strong emphasis on creating new technical capabilities. Success in this position requires the ability to independently translate an under-defined mission objective into a concrete, technically novel capability and the comfort of operating with minimal supervision, incomplete problem definitions, and delayed feedback.
Education, Experience, Knowledge, Skills, and Abilities
- Design, develop, and validate novel vulnerability discovery and exploitation capabilities.
- Conduct expert reverse engineering of binaries (x86-64, ARM64, etc.) using industry-standard tools.
- Identify and exploit real-world vulnerabilities such as Use-after-free, Type confusion, Integer truncation, and Buffer overflow.
- Demonstrate ability to discover new, novel vulnerabilities in complex systems.
- Rapidly understand current vulnerability research and apply findings to identify new instances of vulnerability classes.
- Employ both manual analysis and automated techniques (e.g., fuzzing) for vulnerability discovery.
- Code and debug complex functions in C, Python, and Assembly (x86-64, ARM, etc.).
- Independently manage and execute research objectives, including scoping, research, experimentation, validation, and iteration.
- Travel to customer sites as required.
- Perform on-site for extended periods of time.
Education, Experience, Knowledge, Skills, and Abilities
- Exploit Development:
- Expertise in reverse engineering of binaries (x86-64, ARM64, etc) using tools such as Binary Ninja, Ghidra, or IDA Pro.
- Precise understanding of stack and heap objects and exploit-relevant vulnerabilities (e.g., Use-after-free, Type confusion, Integer truncation, Buffer overflow).
- Vulnerability Discovery:
- Demonstrated ability to discover new vulnerabilities, not just exploit known ones.
- Experience with both manual analysis and automated techniques (e.g., fuzzing).
- Languages:
- Ability to code and debug C, Python, and Assembly (x86-64, ARM, etc).
- Research Ownership & Autonomy:
- Ability to independently translate an under defined mission objective into a concrete, technically novel capability.
- Comfort operating with minimal supervision.
- Clearance & Logistics:
- TS/SCI clearance required (inactive SCI acceptable if SCI-clearable).
- Ability to travel to customer sites as required.
Working Conditions and Physical Requirements
The ideal candidate must be able to complete all physical requirements of the job with or without reasonable accommodation.
Sitting and / or standing - Must be able to remain in a stationary position 50% of the time
Carrying and / or lifting - Must be able to carry / move laptop as needed throughout the work day.
Environment - remote, work-from-home with travel to customer location in Alabama to perform work in cleared spaces.
ADA Statement
Bugcrowd is committed to the full inclusion of all qualified individuals. In keeping with our commitment, Bugcrowd will take the steps to assure that people with disabilities are provided reasonable accommodations. Accordingly, if reasonable accommodation is required to fully participate in the job application or interview process, to perform the essential functions of the position, and/or to receive all other benefits and privileges of employment, please contact HR at ada@bugcrowd.com.
Pay Range Disclosure
At Bugcrowd, we strive for fairness, equality and to create an environment that allows our people to perform at their very best. Our compensation philosophy is to foster a collaborative community that rewards, attracts and retains the best possible talent. The provided salary details are based on US national averages and we retain the flexibility to tailor to the needs of the business.
The national estimate for the current base range for the position is $154,800 - $193,500.
This position may also be eligible to participate in a discretionary bonus program or commission plan, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.
Culture
- At Bugcrowd, we understand that diversity in the workplace is vital to a company’s success and growth. We strive to make sure that people are included and have a sense of being part of making Bugcrowd not only a great product but a great place to work.
- We regularly hear from both customers and researchers that Bugcrowd feels like a family, and we strive to maintain that internally as well.
- Our team consists of a broad range of people: musicians, adventure sports junkies, nature lovers, parents, cereal enthusiasts, night owls, cyclists, artists—you get the point.
At Bugcrowd, we are solving security threats and vulnerabilities that are relevant to everyone, therefore we believe solving these problems takes all kinds of backgrounds. We value the perspectives and experiences people from underrepresented backgrounds bring.
Disclaimer
This position has access to highly confidential, sensitive information relating to the technologies of Bugcrowd. It is essential that the applicant possess the requisite integrity to maintain the information in the strictest confidence.
The company is authorized to obtain background checks for employment purposes under state and federal law. Background checks will be conducted for positions that involve access to confidential or proprietary information (including trade secrets).
Background checks may include Social Security verification, prior employment verification, personal and professional references, educational verification, and criminal history. Applicants with conviction histories will not be excluded from consideration to the extent required bylaw.
Equal Employment Opportunity:
Bugcrowd is EOE, Disability/Age Employer.
Individuals seeking employment at Bugcrowd are considered without regards to race, color, religion, national origin, age, sex, marital status, ancestry, physical or mental disability, veteran status, gender identity, or sexual orientation.
Bugcrowd is committed to the full inclusion of all qualified individuals. In keeping with our commitment, Bugcrowd will take the steps to assure that people with disabilities are provided reasonable accommodations. Accordingly, if reasonable accommodation is required to fully participate in the job application or interview process, to perform the essential functions of the position, and/or to receive all other benefits and privileges of employment, please contact HR at ADA at bugcrowd.com.
Apply at: https://www.bugcrowd.com/about/careers/
Создайте идеальное резюме с помощью ИИ-агента

Навыки
- C++
- Python
- Assembly
- IDA Pro
- Ghidra
- Reverse Engineering
- Vulnerability Research
- Binary Ninja
- Fuzzing
- ARM64
- Exploit Development
- x86-64
Возможные вопросы на собеседовании
Проверка глубокого понимания механизмов управления памятью и эксплуатации уязвимостей.
Опишите ваш процесс разработки стабильного эксплейта для Use-after-free уязвимости в многопоточном приложении.
Оценка навыков работы с инструментами статического анализа.
В каких ситуациях вы предпочтете использование Binary Ninja вместо IDA Pro или Ghidra для анализа ARM64 бинарных файлов?
Проверка опыта в автоматизации поиска уязвимостей.
Расскажите о вашем опыте настройки фаззинг-кампаний для проприетарных протоколов или закрытых систем.
Оценка способности работать в условиях неопределенности.
Приведите пример, когда вам пришлось самостоятельно определять вектор исследования при минимальных вводных данных от заказчика.
Проверка знаний низкоуровневого программирования.
С какими сложностями вы сталкивались при написании шелл-кода для систем с включенными механизмами DEP и ASLR?
Похожие вакансии
Senior Information Security (ИБ)
Senior Android Security / Reverse Engineer (HTTPS Traffic, Google Services)
Исследователь безопасности Android
Эксперт по защите периметра (WAF)
DevOps-инженер/ИБ (devops engineer, information security)
Сеньор AppSecOps-инженер
1000+ офферов получено
Устали искать работу? Мы найдём её за вас
Quick Offer улучшит ваше резюме, подберёт лучшие вакансии и откликнется за вас. Результат — в 3 раза больше приглашений на собеседования и никакой рутины!
- Страна
- США
- Зарплата
- 154 800 $ – 193 500 $