- Страна
- США
- Зарплата
- 100 000 $ – 220 000 $
Откликайтесь
на вакансии с ИИ

Software Reverse Engineer/Vulnerability Researcher
Вакансия предлагает очень конкурентную заработную плату и работу над передовыми технологиями в сфере национальной безопасности. Однако высокий порог входа и требования к уровню допуска ограничивают круг потенциальных кандидатов.
Сложность вакансии
Высокая сложность обусловлена требованием опыта работы более 6 лет, необходимостью наличия активного допуска TS/SCI и глубоких знаний в реверс-инжиниринге и разработке эксплойтов. Работа предполагает глубокое понимание внутренностей ОС и использование специализированных инструментов анализа.
Анализ зарплаты
Предлагаемый диапазон $100k–$220k полностью соответствует рыночным стандартам для специалистов с допуском TS/SCI в регионе Вирджиния. Верхняя граница диапазона выше средней по рынку, что отражает высокую ценность редких навыков в области VR/RE.
Сопроводительное письмо
I am writing to express my strong interest in the Software Reverse Engineer/Vulnerability Researcher position at Two Six Technologies. With over six years of experience in CNO development and a deep focus on binary analysis and vulnerability research, I have developed a robust skill set that aligns perfectly with your team's mission to solve complex cyber challenges. My background includes extensive work with IDA Pro and Ghidra for reverse engineering, as well as developing proof-of-concept exploits for both Windows and Linux environments.
Throughout my career, I have consistently demonstrated the ability to analyze intricate system internals and identify critical security flaws. I am particularly drawn to Two Six Technologies because of your reputation for pushing the boundaries of what is possible in cybersecurity. I am confident that my technical expertise in kernel-space development and my experience working within SCIF environments will allow me to make immediate and impactful contributions to your advanced analytics and intel space projects.
Составьте идеальное письмо к вакансии с ИИ-агентом

Откликнитесь в twosixtechnologies уже сейчас
Присоединяйтесь к команде экспертов Two Six Technologies и решайте сложнейшие задачи в области кибербезопасности уже сегодня!
Описание вакансии
At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future.
Two Six Technologies, is seeking a Vulnerability Research / Reverse Engineer (VR/RE). This role is technical at its core – you will develop new capabilities whose enabling knowledge is found in program analysis, binary patching, and finding security vulnerabilities in systems.
You will be analyzing systems to recognize how they work and developing innovative technologies to create solutions to difficult cyber challenges. You will also need to exhibit agility as part of a team of vulnerability researchers, exploit development specialists, reverse engineers, developers, and testers. This is a challenging role as the field is constantly evolving; the candidate should expect to be a part of a variety of different projects and consistently be challenged.
Work locations: Chantilly, VA, Herndon, VA, or Arlington, VA.
Responsibilities:
- Support cybersecurity development efforts as part of a smaller team in a SCIF
- Perform research into modern operating system security features
- Perform reverse engineering and vulnerability research tasks and create detailed reports to aid the customer and team in understanding the results
- Create POCs demonstrating the capabilities discovered as the result of VR/RE
Requirements:
- Six plus years of professional reverse engineering/vulnerability research experience
- Six plus years of experience working in a CNO development environment
- Six plus years of experience developing POCs to demonstrate capabilities discovered via reverse engineering/vulnerability research
- Demonstrated in-depth understanding of operating system security features and internals
Desired Skills/Experience:
- Software reverse engineering – IDA Pro, Ghidra, disassembly tools
- Networking – networking stack, TCP and UDP protocols
- Cryptography – TLS, PKCS
- Debugging – GDB, WinDbg, OllyDbg, Valgrind, Visual Studio
- Operating Systems - Windows and Linux user and/or kernel space development
Clearance Requirements:
- Active TS/SCI
Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We believe in rewarding skills, experience, and performance. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development.
The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements.
Salary Range
$100,000—$220,000 USD
Looking for other great opportunities? Check out Two Six Technologies Opportunities for all our Company’s current openings!
Ready to make the first move towards growing your career? If so, check out the Two Six Technologies Candidate Journey! This will give you step-by-step directions on applying, what to expect during the application process, information about our rich benefits and perks along with our most frequently asked questions. If you are undecided and would like to learn more about us and how we are contributing to essential missions, check out our Two Six Technologies News page! We share information about the tech world around us and how we are making an impact! Still have questions, no worries! You can reach us at Contact Two Six Technologies. We are happy to connect and cover the information needed to assist you in reaching your next career milestone.
Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law.
If you are an individual with a disability and would like to request reasonable workplace accommodation for any part of our employment process, please send an email to accommodations@twosixtech.com. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.
Additionally, please be advised that this business uses E-Verify in its hiring practices.
By submitting the following application, I hereby certify that to the best of my knowledge, the information provided is true and accurate.
Создайте идеальное резюме с помощью ИИ-агента

Навыки
- C++
- Python
- TCP/IP
- IDA Pro
- Ghidra
- Reverse Engineering
- WinDbg
- GDB
- CNO
- Cryptography
- Vulnerability Research
- Linux Kernel
- Windows Internals
Возможные вопросы на собеседовании
Проверка практических навыков работы с инструментами статического анализа.
Расскажите о наиболее сложном случае реверс-инжиниринга, с которым вы столкнулись при использовании IDA Pro или Ghidra. Как вы справились с обфускацией?
Оценка глубины знаний архитектуры операционных систем.
Опишите механизмы защиты ядра в современных версиях Windows (например, KPP или HVCI) и возможные векторы их обхода.
Проверка опыта в разработке эксплойтов и понимания уязвимостей.
Каков ваш процесс разработки Proof-of-Concept (PoC) после обнаружения потенциальной уязвимости в бинарном файле?
Оценка навыков работы с сетевыми протоколами.
С какими трудностями вы сталкивались при анализе проприетарных сетевых протоколов на базе TCP/UDP?
Проверка умения работать в специфических условиях безопасности.
Есть ли у вас опыт работы в среде SCIF и как вы адаптируете свои рабочие процессы под строгие требования безопасности?
Похожие вакансии
Специалист по защите информации (Mobile Security Engineer)
Senior Information Security (ИБ)
Senior Android Security / Reverse Engineer (HTTPS Traffic, Google Services)
Специалист по информационной безопасности (Пентестер)
Исследователь безопасности Android
Senior AppSecOps Engineer
1000+ офферов получено
Устали искать работу? Мы найдём её за вас
Quick Offer улучшит ваше резюме, подберёт лучшие вакансии и откликнется за вас. Результат — в 3 раза больше приглашений на собеседования и никакой рутины!
- Страна
- США
- Зарплата
- 100 000 $ – 220 000 $