Cybersecurity Researcher Job at Trusted Concepts, Inc. in Arlington
Trusted Concepts, Inc., Arlington, VA, United States, 22201
Join to apply for the Cybersecurity Researcher role at Trusted Concepts, Inc.
Overview Of Opportunity
At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future. Join the Embedded Sector of Two Six Technologies — a team of dedicated hackers in Arlington, Virginia — where you’ll immerse yourself in cutting‑edge Vulnerability Research on a wide range of unique embedded systems. Working side by side with top‑tier CNO developers and hardware engineers, you’ll discover vulnerabilities and create proof of concepts on embedded systems.
What You Will Do
- Analyze and solve complex technical challenges with no predefined answers.
- Perform in‑depth reverse engineering to identify vulnerabilities, assess their impact, and transform findings into actionable capabilities.
- Deconstruct and understand the functionality of intricate technical systems.
- Navigate ambiguity and independently forge paths toward innovative solutions.
- Collaborate in a small‑team environment, where your contributions will have an outsized impact.
- Leverage your expertise in digital forensics and watermarking to inform secure development practices and maintain data integrity throughout the product lifecycle.
What You Will Need (Basic Qualifications)
- Bachelor’s (or higher) degree in Computer Science, Computer/Electrical Engineering, or a related field (or equivalent practical experience).
- Experience developing, debugging, and scripting in C/C++ and Python within Linux command‑line environments, with a strong emphasis on low‑level programming, memory management, and system interaction for reverse engineering and vulnerability research.
- Experience with reverse engineering and vulnerability research, using tools such as IDA Pro, Binary Ninja, or Ghidra.
- Expertise in one or more of the following:
- Firmware analysis (ARM, MIPS, PowerPC, RTOS).
- Firmware rehosting using emulation tools such as QEMU.
- Fuzzing and exploit development.
- Binary obfuscation and anti‑analysis techniques.
- Wireless protocols and radio signal analysis.
- File system forensics and fault injection frameworks.
Nice To Have (Preferred)
- Experience scripting with the Binary Ninja API or Ghidra.
- Experience with other languages (e.g., Go, Rust).
- Knowledge of embedded device security and reverse engineering (e.g., ARM, RTOS).
- Familiarity with cryptography concepts and their implementation.
- Hands‑on experience working with hardware and embedded systems.
- Client‑facing experience in technical roles.
- Prefer active TS/SCI with Poly.
Security Clearance
- Active Top Secret clearance with eligibility/willingness to obtain a Top Secret/SCI clearance. Prefer active TS/SCI with Poly.
Salary Range: $119,646 - $179,469 USD
Competitive compensation package includes medical, dental, vision, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development.
Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. If you are an individual with a disability and would like to request reasonable workplace accommodation for any part of our employment process, please send an email to accommodations@twosixtech.com. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations. Additionally, please be advised that this business uses E‑Verify in its hiring practices. By submitting the following application, I hereby certify that to the best of my knowledge, the information provided is true and accurate.