Trusted Concepts, Inc.
Join to apply for the
Software Reverse Engineer
role at
Trusted Concepts, Inc. Overview Of Opportunity: Join the Wireless Sector at Two Six Technologies, where we push the boundaries of software and firmware reverse engineering to uncover vulnerabilities in wireless and embedded systems. As part of our elite team of security researchers, you’ll work alongside CNO developers and hardware engineers, conducting cutting-edge vulnerability research on complex, real-world targets. What You’ll Do: Reverse engineer wireless and embedded systems, identifying vulnerabilities and assessing their security impact. Develop proof-of-concept exploits for discovered vulnerabilities following DevOps best practices for keeping code bases organized and maintainable. Analyze firmware, software protections, and wireless protocols to uncover security flaws. Utilize and develop custom tools to analyze and manipulate software/firmware binaries. Collaborate closely with CNO developers, vulnerability researchers, and hardware engineers in a fast-paced, small-team environment. Solve complex technical challenges with no predefined solutions. What You’ll Need (Basic Qualifications): Bachelor’s (or higher) degree in Computer Science, Computer/Electrical Engineering, or a related field (or equivalent practical experience). 3+ years of experience with programming/scripting languages in C/C++, Python, and Linux command-line environments. Experience with reverse engineering and vulnerability research, using tools such as IDA Pro, Binary Ninja, or Ghidra. Expertise in one or more of the following: Firmware analysis (ARM, MIPS, PowerPC, RTOS). Firmware rehosting using emulation tools such as QEMU Fuzzing and exploit development. Binary obfuscation and anti-analysis techniques. Wireless protocols and radio signal analysis. File system forensics and fault injection frameworks. Nice To Have (Preferred): Experience scripting with Binary Ninja API or Ghidra. Experience in embedded software development using C/C++ for RTOS or Linux environments. Knowledge of cryptographic security and secure boot mechanisms. Hands-on experience working with hardware debugging tools, JTAG/SWD, or software-defined radio (SDR) frameworks. Familiarity with digital signal processing, wireless security protocols, RF signal processing, and side-channel analysis. Client-facing experience in technical roles. Active TS/SCI with Polygraph preferred. Security Clearance: Active Top Secret clearance required with eligibility/willingness to obtain a TS/SCI. Compensation and Benefits: Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development. Salary: The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements. Salary Range $119,646 - $179,469 USD Other opportunities and company information: Looking for other great opportunities? Check out Two Six Technologies Opportunities for all our Company’s current openings! Ready to make the first move towards growing your career? The Two Six Technologies Candidate Journey provides step-by-step directions on applying and what to expect during the application process. You can reach us at Contact Two Six Technologies. We are happy to connect and assist with your career journey. Equal Opportunity Statement: Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race, color, religion, national origin, sex, sexual orientation, gender identity, age, marital status, disability, genetic information, protected veteran status, or any other characteristic protected by applicable law. If you are an individual with a disability and would like to request reasonable workplace accommodation for any part of our employment process, please email accommodations@twosixtech.com. This information will be kept confidential and used only to provide needed accommodations. E-Verify is used in our hiring practices. Application and consent: By submitting the following application, I certify that the information provided is true and accurate to the best of my knowledge. Seniority level
Mid-Senior level Employment type
Full-time Job function
Engineering and Information Technology Software Development Referrals increase your chances of interviewing at Trusted Concepts, Inc. by 2x
#J-18808-Ljbffr
Software Reverse Engineer
role at
Trusted Concepts, Inc. Overview Of Opportunity: Join the Wireless Sector at Two Six Technologies, where we push the boundaries of software and firmware reverse engineering to uncover vulnerabilities in wireless and embedded systems. As part of our elite team of security researchers, you’ll work alongside CNO developers and hardware engineers, conducting cutting-edge vulnerability research on complex, real-world targets. What You’ll Do: Reverse engineer wireless and embedded systems, identifying vulnerabilities and assessing their security impact. Develop proof-of-concept exploits for discovered vulnerabilities following DevOps best practices for keeping code bases organized and maintainable. Analyze firmware, software protections, and wireless protocols to uncover security flaws. Utilize and develop custom tools to analyze and manipulate software/firmware binaries. Collaborate closely with CNO developers, vulnerability researchers, and hardware engineers in a fast-paced, small-team environment. Solve complex technical challenges with no predefined solutions. What You’ll Need (Basic Qualifications): Bachelor’s (or higher) degree in Computer Science, Computer/Electrical Engineering, or a related field (or equivalent practical experience). 3+ years of experience with programming/scripting languages in C/C++, Python, and Linux command-line environments. Experience with reverse engineering and vulnerability research, using tools such as IDA Pro, Binary Ninja, or Ghidra. Expertise in one or more of the following: Firmware analysis (ARM, MIPS, PowerPC, RTOS). Firmware rehosting using emulation tools such as QEMU Fuzzing and exploit development. Binary obfuscation and anti-analysis techniques. Wireless protocols and radio signal analysis. File system forensics and fault injection frameworks. Nice To Have (Preferred): Experience scripting with Binary Ninja API or Ghidra. Experience in embedded software development using C/C++ for RTOS or Linux environments. Knowledge of cryptographic security and secure boot mechanisms. Hands-on experience working with hardware debugging tools, JTAG/SWD, or software-defined radio (SDR) frameworks. Familiarity with digital signal processing, wireless security protocols, RF signal processing, and side-channel analysis. Client-facing experience in technical roles. Active TS/SCI with Polygraph preferred. Security Clearance: Active Top Secret clearance required with eligibility/willingness to obtain a TS/SCI. Compensation and Benefits: Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development. Salary: The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements. Salary Range $119,646 - $179,469 USD Other opportunities and company information: Looking for other great opportunities? Check out Two Six Technologies Opportunities for all our Company’s current openings! Ready to make the first move towards growing your career? The Two Six Technologies Candidate Journey provides step-by-step directions on applying and what to expect during the application process. You can reach us at Contact Two Six Technologies. We are happy to connect and assist with your career journey. Equal Opportunity Statement: Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race, color, religion, national origin, sex, sexual orientation, gender identity, age, marital status, disability, genetic information, protected veteran status, or any other characteristic protected by applicable law. If you are an individual with a disability and would like to request reasonable workplace accommodation for any part of our employment process, please email accommodations@twosixtech.com. This information will be kept confidential and used only to provide needed accommodations. E-Verify is used in our hiring practices. Application and consent: By submitting the following application, I certify that the information provided is true and accurate to the best of my knowledge. Seniority level
Mid-Senior level Employment type
Full-time Job function
Engineering and Information Technology Software Development Referrals increase your chances of interviewing at Trusted Concepts, Inc. by 2x
#J-18808-Ljbffr