Trusted Concepts, Inc.
Overview
Two Six Technologies seeks a skilled
Senior Wireless Vulnerability Researcher
to support our growing team of experts in vulnerability research, reverse engineering, and exploit development. This role involves conducting cutting-edge security research on Android platforms and wireless communication systems. This position is hybrid, with up to three days per week on-site with our customer in Lorton, VA. While remote work is currently supported, team members may be required to attend in-person collaboration sessions several times per year for 1–2 weeks at a time. Remote status is subject to change at the customer’s direction. Key Responsibilities
Perform in-depth reverse engineering of mobile software, firmware, and hardware components to identify security flaws. Analyze and develop proofs-of-concept for vulnerabilities across a variety of targets, including mobile kernels, applications, and communication protocols. Discover and exploit vulnerabilities, including those that can lead to memory corruption (e.g., stack overflows, heap overflows, integer overflows), and logical errors in code. Bypass advanced exploit mitigations such as ASLR, code signing, non-executable memory protections, and sandboxing. Refine and integrate exploitation techniques to accurately assess vulnerability severity. Automate techniques to identify vulnerabilities, trigger them efficiently, and optimize exploitation processes. Lead and mentor a team conducting vulnerability research on mobile technologies—including Android, iOS, and Linux—while providing technical guidance, developing new methods, and ensuring effective implementation of research insights to enhance customer outcomes. Clearly document and communicate technical findings through detailed reports and briefings to technical and non-technical audiences. Minimum Qualifications
Bachelor’s degree in Computer Science or a related technical field (strong relevant experience may substitute for specific degree). At least 6 years of professional experience in reverse engineering with a focus on mobile devices, operating systems, and protocol analysis, with proficiency in reverse engineering tools such as IDA Pro and Ghidra. Expertise in ARM64 architecture with hands-on experience in reverse engineering and an understanding of its properties such as instructions, memory layouts, and effective exploitation approaches. Experience in vulnerability research including attack surface assessment, vulnerability discovery through fuzzing or code auditing, and proof-of-concept development. Proficiency in software development with low-level programming (C and/or Rust and ARM assembly language). Preferred Qualifications
Deep knowledge of mobile OS (iOS or Android) internals and current security exploitation techniques. Experience with wireless communication systems (e.g., Bluetooth, Wi-Fi, cellular) and their interactions with mobile devices. Previous experience in a client-facing technical role. Clearance Requirements
Active Top Secret clearance and be able to obtain a SCI and CI polygraph after hire. Compensation and Benefits
Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We offer medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development. The projected salary range is annualized and is a general guideline. Salary is one component of total compensation and the final offer is determined by factors including education, experience, knowledge, skills, geographic location, contract affordability, and organizational requirements. Salary Range
$137,333 - $205,999 USD Other Information
Looking for other great opportunities? Check out Two Six Technologies Opportunities for all our Company’s current openings! Ready to make the first move towards growing your career? Check out the Two Six Technologies Candidate Journey for step-by-step directions on applying, what to expect during the application process, information about our benefits and perks, and frequently asked questions. If you’d like to learn more about us, visit our News page. You can reach us at Contact Two Six Technologies. We are happy to connect and assist you in reaching your next career milestone. Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race, color, religion, national origin, sex, age, disability, or veteran status. If you are an individual with a disability and would like to request reasonable workplace accommodations, please email accommodations@twosixtech.com. This organization uses E-Verify in its hiring practices. By submitting the application, you certify that the information provided is true and accurate.
#J-18808-Ljbffr
Two Six Technologies seeks a skilled
Senior Wireless Vulnerability Researcher
to support our growing team of experts in vulnerability research, reverse engineering, and exploit development. This role involves conducting cutting-edge security research on Android platforms and wireless communication systems. This position is hybrid, with up to three days per week on-site with our customer in Lorton, VA. While remote work is currently supported, team members may be required to attend in-person collaboration sessions several times per year for 1–2 weeks at a time. Remote status is subject to change at the customer’s direction. Key Responsibilities
Perform in-depth reverse engineering of mobile software, firmware, and hardware components to identify security flaws. Analyze and develop proofs-of-concept for vulnerabilities across a variety of targets, including mobile kernels, applications, and communication protocols. Discover and exploit vulnerabilities, including those that can lead to memory corruption (e.g., stack overflows, heap overflows, integer overflows), and logical errors in code. Bypass advanced exploit mitigations such as ASLR, code signing, non-executable memory protections, and sandboxing. Refine and integrate exploitation techniques to accurately assess vulnerability severity. Automate techniques to identify vulnerabilities, trigger them efficiently, and optimize exploitation processes. Lead and mentor a team conducting vulnerability research on mobile technologies—including Android, iOS, and Linux—while providing technical guidance, developing new methods, and ensuring effective implementation of research insights to enhance customer outcomes. Clearly document and communicate technical findings through detailed reports and briefings to technical and non-technical audiences. Minimum Qualifications
Bachelor’s degree in Computer Science or a related technical field (strong relevant experience may substitute for specific degree). At least 6 years of professional experience in reverse engineering with a focus on mobile devices, operating systems, and protocol analysis, with proficiency in reverse engineering tools such as IDA Pro and Ghidra. Expertise in ARM64 architecture with hands-on experience in reverse engineering and an understanding of its properties such as instructions, memory layouts, and effective exploitation approaches. Experience in vulnerability research including attack surface assessment, vulnerability discovery through fuzzing or code auditing, and proof-of-concept development. Proficiency in software development with low-level programming (C and/or Rust and ARM assembly language). Preferred Qualifications
Deep knowledge of mobile OS (iOS or Android) internals and current security exploitation techniques. Experience with wireless communication systems (e.g., Bluetooth, Wi-Fi, cellular) and their interactions with mobile devices. Previous experience in a client-facing technical role. Clearance Requirements
Active Top Secret clearance and be able to obtain a SCI and CI polygraph after hire. Compensation and Benefits
Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We offer medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development. The projected salary range is annualized and is a general guideline. Salary is one component of total compensation and the final offer is determined by factors including education, experience, knowledge, skills, geographic location, contract affordability, and organizational requirements. Salary Range
$137,333 - $205,999 USD Other Information
Looking for other great opportunities? Check out Two Six Technologies Opportunities for all our Company’s current openings! Ready to make the first move towards growing your career? Check out the Two Six Technologies Candidate Journey for step-by-step directions on applying, what to expect during the application process, information about our benefits and perks, and frequently asked questions. If you’d like to learn more about us, visit our News page. You can reach us at Contact Two Six Technologies. We are happy to connect and assist you in reaching your next career milestone. Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race, color, religion, national origin, sex, age, disability, or veteran status. If you are an individual with a disability and would like to request reasonable workplace accommodations, please email accommodations@twosixtech.com. This organization uses E-Verify in its hiring practices. By submitting the application, you certify that the information provided is true and accurate.
#J-18808-Ljbffr