yandex
Страна
США
Зарплата
117 235 $ – 201 205 $
+500% приглашений

Откликайтесь
на вакансии с ИИ

Ускорим процесс поиска работы
LeadГибридПолная занятость

Lead Vulnerability Researcher

Оценка ИИ

Позиция предлагает работу над уникальными и сложными проектами в сфере национальной безопасности с конкурентной заработной платой. Высокий балл обусловлен стабильностью компании, отличным пакетом льгот и возможностью профессионального роста в роли лидера, несмотря на строгие требования к безопасности.


Вакансия из Quick Offer Global, списка международных компаний
Пожаловаться

Сложность вакансии

ЛегкоСложно
Оценка ИИ

Высокая сложность обусловлена требованием экспертных знаний в реверс-инжиниринге, низкоуровневом программировании и беспроводных протоколах. Кроме того, позиция требует наличия активного допуска к секретной работе (Secret Clearance) с возможностью получения TS/SCI, что значительно сужает круг подходящих кандидатов.

Анализ зарплаты

Медиана165 000 $
Рынок130 000 $ – 210 000 $
Оценка ИИ

Предлагаемый диапазон ($117k - $201k) полностью соответствует рыночным ожиданиям для позиции Lead в сфере Vulnerability Research в США. Нижняя граница соответствует средним показателям по региону Огайо, в то время как верхняя граница учитывает высокую специализацию и необходимость допуска к секретной информации.

Сопроводительное письмо

I am writing to express my strong interest in the Lead Vulnerability Researcher position at Two Six Technologies. With extensive experience in reverse engineering and a proven track record of discovering vulnerabilities in complex embedded systems, I am confident in my ability to lead your research initiatives in Dayton. My expertise with Ghidra, IDA Pro, and various assembly languages, combined with my experience in technical leadership, aligns perfectly with your mission to solve the world’s most complex wireless challenges.

Throughout my career, I have successfully bridged the gap between high-level mission requirements and deep-dive technical execution. I am particularly drawn to Two Six Technologies' commitment to innovation in the Wireless Sector and your collaborative culture. I am eager to bring my skills in architecting research strategies and mentoring junior researchers to your team, ensuring the continued delivery of high-quality results for your government programs.

+250% к просмотрам

Составьте идеальное письмо к вакансии с ИИ-агентом

Составьте идеальное письмо к вакансии с ИИ-агентом

Откликнитесь в twosixtechnologies уже сейчас

Присоединяйтесь к лидерам в области кибербезопасности и внесите свой вклад в национальную безопасность США — подайте заявку сегодня!

Описание вакансии

At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future.

Overview of Opportunity:

Two Six Technologies is seeking a Lead Vulnerability Researcher to spearhead our vulnerability research initiatives in Dayton, Ohio. In this leadership role, you are more than a technical expert; you are a strategist and mentor who defines research methodologies and solves our most complex wireless and embedded system challenges.

You will bridge the gap between high-level mission requirements and deep-dive technical execution. As a Lead, you will drive innovation within our Wireless Sector, ensuring our team remains at the forefront of the industry while serving as a primary technical point of contact for mission-critical government programs.

What You Will Do

  • Lead the execution of large-scale vulnerability research projects, ensuring high-quality results and innovative approaches.
  • Architect research strategies for complex, undocumented, or highly resilient embedded and wireless systems.
  • Grow the technical capabilities of the team by mentoring junior and staff researchers through code reviews and knowledge sharing.
  • Interface directly with customers to translate mission needs into technical requirements and present complex research findings.
  • Identify and implement new tools, automation, or methodologies (IR&D) to improve the team's research efficiency and capabilities.

What You Will Need (Basic Qualifications)

  • Bachelor’s Degree in Electrical Engineering, Computer Engineering, Computer Science, or a related field.
  • Extensive experience in vulnerability research, reverse engineering, or CNO development.
  • Expert-level proficiency in modern decompilers (Ghidra, IDA Pro, or Binary Ninja).
  • Advanced knowledge of assembly languages (x86, ARM, MIPS, etc.) and OS internals.
  • Knowledge of common network protocols TCP/IP, UDP, or HTTP
  • Proficiency with at least one modern debugger such as GDB or WinDBG
  • Proven track record of discovering vulnerabilities in complex systems or developing sophisticated exploits.
  • Experience in a technical leadership or project lead capacity.
  • Security Clearance: Active US Secret-level clearance with the ability to obtain and maintain TS/SCI.

Nice to Have (Preferred)

  • Experience assisting in technical writing for RFPs, white papers, or grant proposals to secure new research funding.
  • Mastery of defeating modern mitigations (ASLR, DEP, CFG) on non-standard architectures.
  • Deep knowledge of cellular standards (4G/5G) or low-bandwidth communications (CAN bus, RS485).
  • History of published research, conference presentations (DEF CON, Black Hat), or CVE credits.
  • Previous experience in a client-facing technical lead role for government contracts.

#LI-ZS1

#LI-HYBRID

Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We believe in rewarding skills, experience, and performance. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development.

The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements.

Salary Range

$117,235—$201,205 USD

Looking for other great opportunities? Check out Two Six Technologies Opportunities for all our Company’s current openings!

Ready to make the first move towards growing your career? If so, check out the Two Six Technologies Candidate Journey!  This will give you step-by-step directions on applying, what to expect during the application process, information about our rich benefits and perks along with our most frequently asked questions.  If you are undecided and would like to learn more about us and how we are contributing to essential missions, check out our  Two Six Technologies News page!  We share information about the tech world around us and how we are making an impact!  Still have questions, no worries!  You can reach us at Contact Two Six Technologies. We are happy to connect and cover the information needed to assist you in reaching your next career milestone.

Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law.

If you are an individual with a disability and would like to request reasonable workplace accommodation for any part of our employment process, please send an email to accommodations@twosixtech.com. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.

Additionally, please be advised that this business uses E-Verify in its hiring practices.

By submitting the following application, I hereby certify that to the best of my knowledge, the information provided is true and accurate.

+400% к собеседованиям

Создайте идеальное резюме с помощью ИИ-агента

Создайте идеальное резюме с помощью ИИ-агента

Навыки

  • Embedded Systems
  • TCP/IP
  • HTTP
  • ARM
  • x86
  • IDA Pro
  • Ghidra
  • Reverse Engineering
  • WinDbg
  • GDB
  • Vulnerability Research
  • UDP
  • MIPS
  • Binary Ninja
  • Assembly Language
  • Wireless Security
  • CNO Development

Возможные вопросы на собеседовании

Проверка глубины знаний инструментов и методологии исследования бинарных файлов.

Опишите ваш процесс исследования закрытой прошивки встроенной системы при отсутствии документации: с чего вы начнете и какие инструменты будете использовать?

Оценка лидерских качеств и способности развивать команду.

Как вы подходите к проведению код-ревью и менторству младших исследователей, чтобы повысить общую техническую грамотность команды?

Проверка навыков обхода современных защитных механизмов.

Расскажите о вашем опыте обхода таких механизмов защиты, как ASLR и DEP, на нестандартных архитектурах (не x86/x64).

Оценка умения взаимодействовать с заказчиком и переводить технические детали на язык бизнеса/миссии.

Как вы объясняете сложные технические уязвимости и их риски клиентам, которые не обладают глубокими техническими знаниями?

Проверка специализации в области беспроводных технологий.

С какими специфическими проблемами безопасности вы сталкивались при анализе протоколов сотовой связи (4G/5G) или шин передачи данных (например, CAN bus)?

Похожие вакансии

N
Navio
от 300 000 ₽

Ведущий специалист по безопасности приложений (AppSec)

LeadГибридРоссия
AppSec · SAST · SCA · ASOC · AntiDDoS · WAF · Kubernetes · Cloud Infrastructure · Linux · Jira · GitLab · Artifactory · Network Security
+13 навыков
Т
Т-Банк
от 430 000 ₽

Red Team Lead

LeadВ офисеРоссия
Red Teaming · Offensive Security · Python · Go · C++ · PowerShell · Linux · Windows · Active Directory · MITRE ATT&CK · SIEM · EDR · WAF · Threat Intelligence · Purple Teaming · PKI · Cryptography
+17 навыков
N
netskope
147 000 $ – 299 500 $

Principal Engineer, Cloud Firewall

LeadУдалённоСША
C++ · TCP/IP · SSL/TLS · Firewall · IPS/IDS · Wireshark · TCPDump · GTest · PyTest · Ansible · Kubernetes · SQL · NoSQL · CI/CD · Jenkins · Distributed Systems
+16 навыков
J
JETLYN
210 000 ₽ – 260 000 ₽

Специалист по защите информации (Mobile Security Engineer)

SeniorУдалённоРоссия
iOS · Cryptography · Jailbreak · HTTPS · REST API · gRPC · TCP · UDP · HTTP · Protobuf · JSON · Avro · MessagePack · Reverse Engineering
+14 навыков
AG
Atom group
4 000 $ – 5 000 $

Senior Information Security (ИБ)

SeniorУдалённоБеларусь
Information Security · DevSecOps · SDLC · Risk Management · Security Policy · DevOps
+6 навыков
I
iherb
177 000 $ – 225 000 $

Principal Application Security Engineer

LeadУдалённоСША
Python · C++ · .NET · JavaScript · Node.js · Java · AWS · Docker · SAST · DAST · SCA · Threat Modeling · Cryptography · API Design · Microservices · Cloudflare · OWASP Top 10
+17 навыков
более 1000 офферов получено
4.9

1000+ офферов получено

Устали искать работу? Мы найдём её за вас

Quick Offer улучшит ваше резюме, подберёт лучшие вакансии и откликнется за вас. Результат — в 3 раза больше приглашений на собеседования и никакой рутины!

Страна
США
Зарплата
117 235 $ – 201 205 $