- Страна
- США
- Зарплата
- 143 763 $ – 215 644 $
Откликайтесь
на вакансии с ИИ

Senior CNO Developer
Вакансия предлагает очень конкурентную заработную плату и возможность работы над уникальными проектами в сфере национальной безопасности. Однако высокие требования к безопасности (Top Secret) и обязательное присутствие в офисе могут ограничить круг кандидатов.
Сложность вакансии
Высокая сложность обусловлена необходимостью наличия действующего допуска Top Secret, глубоких знаний в реверс-инжиниринге (x86/ARM), анализе прошивок и разработке эксплойтов. Работа требует редкого сочетания навыков низкоуровневого программирования и понимания телекоммуникационных протоколов.
Анализ зарплаты
Предлагаемый диапазон ($143k - $216k) полностью соответствует и даже немного превышает рыночные показатели для Senior CNO ролей в Арлингтоне, учитывая необходимость высокого уровня допуска. Верхняя граница значительно выше медианы, что делает предложение очень привлекательным.
Сопроводительное письмо
I am writing to express my strong interest in the Senior CNO Developer position at Two Six Technologies. With over five years of experience in agile software development and a deep focus on C/C++ and Python, I have developed a robust skill set in reverse engineering and vulnerability research. My background in analyzing firmware and operating system internals aligns perfectly with your team's mission to transform cutting-edge research into operational cyber capabilities.
Throughout my career, I have successfully transitioned complex proofs-of-concept into maintainable, production-ready codebases. I am particularly drawn to this role because of the opportunity to work on advanced telecommunications research and embedded systems. My expertise with tools like Ghidra and Binary Ninja, combined with a solid understanding of network protocols and memory management, positions me to contribute immediately to your Trusted Electronics and Effects team.
I currently hold an active U.S. Top Secret security clearance and am prepared to meet the requirements for SCI access. I am eager to bring my technical problem-solving skills to Two Six Technologies and collaborate with your multidisciplinary team in Arlington to solve high-stakes challenges.
Составьте идеальное письмо к вакансии с ИИ-агентом

Откликнитесь в twosixtechnologies уже сейчас
Присоединяйтесь к команде Two Six Technologies и создавайте передовые кибер-решения для защиты глобального будущего!
Описание вакансии
At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future.
Overview of Opportunity
Two Six Technologies is seeking a Senior CNO Developer to join our Trusted Electronics and Effects team supporting an advanced telecommunications research and cyber capability development program.
This is a full-time, in-office position based in our Arlington, Virginia office, where close collaboration across reverse engineering, vulnerability research, and hardware teams is critical to mission success.
This program has conducted deep technical research into telecommunications access mechanisms within defined systems, identifying novel methods that enable system access without traditional interaction. The team is now focused on leveraging that research to perform advanced reverse engineering and vulnerability research, as well as to develop operational tools and capabilities that can be deployed in complex, real-world environments.
In this role, you will work alongside reverse engineers and vulnerability researchers to transform cutting-edge research into mission-ready cyber capabilities. You will be part of a small, highly collaborative team building custom software tools and evolving innovative proofs-of-concept into robust operational solutions.
What You Will Do:
- Design and develop custom tools and software targeting embedded and telecommunications systems
- Serve as a cyber capability developer on a small, highly motivated team
- Develop proofs-of-concept from discovered vulnerabilities and transition them into robust, maintainable codebases following DevOps best practices
- Analyze firmware, software protections, operating system internals, and wireless protocols to uncover exploitable security flaws
- Conduct reverse engineering and vulnerability research against complex Linux-based and embedded systems
- Utilize and extend custom tools to analyze and manipulate software/firmware binaries
- Develop capabilities that leverage novel telecommunications access mechanisms
- Collaborate closely with developers, vulnerability researchers, and hardware engineers in a fast-paced environment
- Solve complex, ambiguous technical challenges with limited prior experience
- Engage in technical discussions with transition partners and mission stakeholders
What You Will Need (Minimum Qualifications):
- Bachelor’s degree in Computer Science, Computer/Electrical Engineering, or related scientific discipline
- Minimum 5 years of experience designing and/or prototyping applications using agile software development processes
- Minimum 2 years of experience with one or more of the following: Python, C, C++
- Minimum 2 years of experience with operating system internals (privilege models, user groups, binary memory layout)
- At least 2 years of experience with network socket programming and expert packet-level understanding of IP, TCP, and related application-level protocols
- At least 2 years of experience with reverse engineering x86/ARM binaries or embedded systems
- Experience tracing code execution in debuggers (WinDbg, GDB, or equivalent)
- Expertise in one or more of the following areas:
- Firmware analysis (ARM, RTOS, or similar)
- Fuzzing and exploit development
- Wireless protocols through Wireshark
- File system forensics and fault injection frameworks
- Scripting with Binary Ninja or Ghidra
- Binary Ninja API or Ghidra
- Active U.S. Top Secret security clearance with ability to obtain and maintain SCI access
Nice to Have (Preferred Qualifications):
- Familiarity with identifying and analyzing vulnerabilities in complex applications
Knowledge of memory protection mechanisms (ASLR, DEP, etc.)
- Experience with CI/CD pipelines and virtualized test ranges
- Experience with firmware or driver development across Linux, Windows, or embedded systems
- Strong understanding of memory management (heap, stack, virtual memory, MMU, physical vs. virtual addressing)
- Experience working with telecommunications systems, including protocol analysis, access mechanisms, or infrastructure components (5G experience a plus)
- Graduate degree in Computer Science, Computer/Electrical Engineering, or related field
Clearance Requirements:
- Active U.S. Security clearance of Top Secret level with the ability to obtain/maintain SCI
#LI-JK1
#LI-ONSITE
Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We believe in rewarding skills, experience, and performance. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development.
The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements.
Salary Range
$143,763—$215,644 USD
Looking for other great opportunities? Check out Two Six Technologies Opportunities for all our Company’s current openings!
Ready to make the first move towards growing your career? If so, check out the Two Six Technologies Candidate Journey! This will give you step-by-step directions on applying, what to expect during the application process, information about our rich benefits and perks along with our most frequently asked questions. If you are undecided and would like to learn more about us and how we are contributing to essential missions, check out our Two Six Technologies News page! We share information about the tech world around us and how we are making an impact! Still have questions, no worries! You can reach us at Contact Two Six Technologies. We are happy to connect and cover the information needed to assist you in reaching your next career milestone.
Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law.
If you are an individual with a disability and would like to request reasonable workplace accommodation for any part of our employment process, please send an email to accommodations@twosixtech.com. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.
Additionally, please be advised that this business uses E-Verify in its hiring practices.
By submitting the following application, I hereby certify that to the best of my knowledge, the information provided is true and accurate.
Создайте идеальное резюме с помощью ИИ-агента

Навыки
- C++
- Python
- Embedded Systems
- Linux
- DevOps
- TCP/IP
- ARM
- Ghidra
- Reverse Engineering
- WinDbg
- GDB
- Wireshark
- Firmware Analysis
- Binary Ninja
- Fuzzing
- x86 Architecture
- Exploit Development
Возможные вопросы на собеседовании
Проверка навыков низкоуровневой отладки и понимания архитектуры систем.
Опишите ваш опыт использования GDB или WinDbg для анализа падения системы в embedded-среде. С какими специфическими трудностями вы сталкивались?
Оценка опыта в реверс-инжиниринге и использовании специализированного ПО.
Расскажите о наиболее сложном случае реверс-инжиниринга бинарного файла, который вы выполняли с помощью Ghidra или Binary Ninja. Как вы автоматизировали процесс через API?
Проверка знаний сетевой безопасности и протоколов.
Как бы вы подошли к поиску уязвимостей в кастомном сетевом протоколе на базе TCP/IP, не имея исходного кода?
Оценка понимания механизмов защиты памяти.
Какие методы обхода ASLR и DEP вы считаете наиболее эффективными при разработке эксплойтов для современных Linux-систем?
Проверка навыков работы в команде и DevOps-практик.
Как вы обеспечиваете надежность и поддерживаемость кода при переходе от быстрого прототипа (PoC) к полноценному инструменту в рамках CI/CD?
Похожие вакансии
.NET разработчик Middle+ , Senior
Senior C++ Developer (ATM / Payment Systems)
Senior Java developer
Старший разработчик C++
Senior Java Developer
Senior Python Developer
1000+ офферов получено
Устали искать работу? Мы найдём её за вас
Quick Offer улучшит ваше резюме, подберёт лучшие вакансии и откликнется за вас. Результат — в 3 раза больше приглашений на собеседования и никакой рутины!
- Страна
- США
- Зарплата
- 143 763 $ – 215 644 $