- Страна
- США
- Зарплата
- 164 383 $ – 246 575 $
Откликайтесь
на вакансии с ИИ

Lead Vulnerability Researcher
Высокая оценка обусловлена конкурентной заработной платой, работой над критически важными проектами национальной безопасности и возможностью профессионального роста в среде топовых экспертов. Ограничением является требование высокого уровня допуска к гостайне.
Сложность вакансии
Роль требует исключительных навыков в реверс-инжиниринге, поиске уязвимостей и лидерстве. Высокая сложность обусловлена необходимостью работы с нестандартными архитектурами (ARM, MIPS, PowerPC) и наличием допуска к секретной информации (Top Secret).
Анализ зарплаты
Предлагаемая зарплата ($164k - $246k) находится на верхнем уровне рынка для позиций Lead Vulnerability Researcher в США, особенно учитывая специфику работы с государственным сектором и требования к допуску. Она полностью соответствует или даже превышает средние показатели для высококвалифицированных специалистов в области кибербезопасности в регионе Вирджиния.
Сопроводительное письмо
I am writing to express my strong interest in the Lead Vulnerability Researcher position at Two Six Technologies. With extensive experience in reverse engineering complex embedded systems and a proven track record of leading technical teams, I am confident in my ability to contribute to the Trusted Electronics & Effects unit. My background in C/C++ and Python, combined with deep expertise in tools like IDA Pro and Ghidra, aligns perfectly with your requirements for discovering vulnerabilities in unique Linux-based applications and firmware.
Throughout my career, I have specialized in firmware analysis across various architectures including ARM and MIPS, and I have a strong passion for developing automated tools to streamline binary patching and fingerprinting. I am particularly drawn to Two Six Technologies' mission of solving complex national security challenges and would welcome the opportunity to bring my technical leadership and research skills to your Arlington-based team. I currently hold an active security clearance and am prepared to meet the rigorous standards required for this role.
Составьте идеальное письмо к вакансии с ИИ-агентом

Откликнитесь в twosixtechnologies уже сейчас
Присоединяйтесь к команде элитных хакеров в Two Six Technologies и защищайте национальную безопасность, работая с передовыми технологиями поиска уязвимостей!
Описание вакансии
At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future.
Overview of Opportunity
Join the Trusted Electronics & Effects business unit of Two Six Technologies, a team of dedicated hackers in Arlington, Virginia, where you’ll immerse yourself in cutting-edge Vulnerability Research on a wide range of unique embedded systems. Working side by side with top-tier CNO developers and hardware engineers, you’ll discover vulnerabilities and create proof of concepts on embedded systems. Our fast-growing roster of government customers relies on us to deliver advanced security solutions, and we’re seeking a Lead Vulnerability Researcher to help us continue pushing the boundaries. If you’re passionate about building tools that make a tangible impact on national security, we want you on our team.
Responsibilities Include
- Take on complex technical problems for which there is often no known answer
- Develop tools and techniques to assist/automate tasks that traditionally require significant manual reverse engineering effort to include Binary patching, Vulnerability research, and Binary fingerprinting
- Perform in depth reverse engineering on complex linux based applications
- Follow-on development to productize results/PoCs or handoff to developer for productization
- Provide technical leadership and direction on multiple ongoing projects, and interface directly with clients/key stakeholders to present findings and gather design constraints
Minimum Qualifications
- Bachelor’s degree in Computer Science, Computer Engineering, Electrical Engineering, or a related technical discipline. Equivalent practical experience in security research, reverse engineering, vulnerability research, or exploit development may substitute for a degree.
- Experience developing, debugging, and scripting in C/C++ and Python within Linux command-line environments, with a strong emphasis on low-level programming, memory management, and system interaction for reverse engineering and vulnerability research
- Experience with reverse engineering and vulnerability research, using tools such as IDA Pro, Binary Ninja, or Ghidra
- Expertise in one or more of the following:
- Firmware analysis (ARM, MIPS, PowerPC, RTOS)
- Firmware rehosting using emulation tools such as QEMU
- Fuzzing and exploit development
- Binary obfuscation and anti-analysis techniques
- Wireless protocols and radio signal analysis
- File system forensics and fault injection frameworks
- Experience leading a team of engineers and researchers
Nice If You Have
- Experience in a client-facing technical role
- Experience with IDA or Ghidra reverse engineering toolsets
- Bachelor’s (or higher) degree in computer science, engineering, or a related field
- Experience reverse engineering binary payloads from multiple architectures (ARM, MIPS, TI, x86, x64)
- Experience reverse engineering data payloads at rest (file formats etc) and in flight (tcp/ip and other bus captures)
Clearance Requirements:
- Active Top Secret clearance with eligibility/willingness to obtain a Top Secret/SCI clearance. Prefer active TS/SCI with Poly
#LI-ZS1
#LI-ONSITE
Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We believe in rewarding skills, experience, and performance. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development.
The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements.
Salary Range
$164,383—$246,575 USD
Looking for other great opportunities? Check out Two Six Technologies Opportunities for all our Company’s current openings!
Ready to make the first move towards growing your career? If so, check out the Two Six Technologies Candidate Journey! This will give you step-by-step directions on applying, what to expect during the application process, information about our rich benefits and perks along with our most frequently asked questions. If you are undecided and would like to learn more about us and how we are contributing to essential missions, check out our Two Six Technologies News page! We share information about the tech world around us and how we are making an impact! Still have questions, no worries! You can reach us at Contact Two Six Technologies. We are happy to connect and cover the information needed to assist you in reaching your next career milestone.
Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law.
If you are an individual with a disability and would like to request reasonable workplace accommodation for any part of our employment process, please send an email to accommodations@twosixtech.com. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.
Additionally, please be advised that this business uses E-Verify in its hiring practices.
By submitting the following application, I hereby certify that to the best of my knowledge, the information provided is true and accurate.
Создайте идеальное резюме с помощью ИИ-агента

Навыки
- C++
- Python
- Linux
- Reverse Engineering
- Vulnerability Research
- IDA Pro
- Binary Ninja
- Ghidra
- ARM
- MIPS
- PowerPC
- RTOS
- QEMU
- Fuzzing
- Exploit Development
- Forensics
Возможные вопросы на собеседовании
Оценка практического опыта работы с инструментами статического анализа.
Расскажите о наиболее сложном случае реверс-инжиниринга бинарного файла, с которым вы столкнулись. Какие инструменты (IDA Pro, Ghidra) и методы вы использовали для преодоления обфускации?
Проверка навыков работы с низкоуровневым ПО и эмуляцией.
Опишите ваш опыт рехостинга прошивок с использованием QEMU. С какими основными трудностями вы сталкивались при эмуляции специфического оборудования?
Оценка лидерских качеств и умения управлять проектами.
Как вы распределяете задачи в команде исследователей при работе над проектом с жесткими дедлайнами и отсутствием готовых решений?
Проверка знаний в области эксплуатации уязвимостей.
Каков ваш подход к разработке Proof of Concept (PoC) для уязвимостей в памяти (например, переполнение буфера) на архитектурах, отличных от x86?
Оценка навыков взаимодействия с заказчиком.
Как вы объясняете сложные технические уязвимости и риски клиентам или стейкхолдерам, не обладающим глубокими техническими знаниями?
Похожие вакансии
Ведущий специалист по безопасности приложений (AppSec)
Red Team Lead
Principal Engineer, Cloud Firewall
Principal Privacy Engineer
Principal Application Security Engineer
Senior Android Security / Reverse Engineer (HTTPS Traffic, Google Services)
1000+ офферов получено
Устали искать работу? Мы найдём её за вас
Quick Offer улучшит ваше резюме, подберёт лучшие вакансии и откликнется за вас. Результат — в 3 раза больше приглашений на собеседования и никакой рутины!
- Страна
- США
- Зарплата
- 164 383 $ – 246 575 $