Two Six Technologies
Overview of Opportunity
At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future.
Join the Wireless Sector at Two Six Technologies in Herndon, Virginia, where we push the boundaries of software and firmware reverse engineering to uncover vulnerabilities in wireless and embedded systems. As part of our elite team of security researchers, you’ll work alongside CNO developers and hardware engineers, conducting cutting‑edge vulnerability research on complex, real‑world targets.
What you will do
Reverse engineer wireless and embedded systems, identifying vulnerabilities and assessing their security impact.
Develop proof‑of‑concept exploits for discovered vulnerabilities following DevOps best practices for keeping code bases organized and maintainable.
Analyze firmware, software protections, and wireless protocols to uncover security flaws.
Utilize and develop custom tools to analyze and manipulate software/firmware binaries.
Collaborate closely with CNO developers, vulnerability researchers, and hardware engineers in a fast‑paced, small‑team environment.
Solve complex technical challenges with no predefined solutions.
What You’ll Need (Basic Qualifications)
Bachelor’s (or higher) degree in Computer Science, Computer/Electrical Engineering, or a related field (or equivalent practical experience).
Proficient with programming/scripting languages such as C/C++, Python, and Linux command‑line environments.
Experience with reverse engineering and vulnerability research, using tools such as IDA Pro, Binary Ninja, or Ghidra.
Expertise in one or more of the following:
Firmware analysis (ARM, MIPS, PowerPC, RTOS).
Firmware rehosting using emulation tools such as QEMU.
Fuzzing and exploit development.
Binary obfuscation and anti‑analysis techniques.
Wireless protocols and radio signal analysis.
File system forensics and fault injection frameworks.
Nice to Have (Preferred)
Experience scripting with Binary Ninja API or Ghidra.
Experience in embedded software development using C/C++ for RTOS or Linux environments.
Knowledge of cryptographic security and secure boot mechanisms.
Hands‑on experience working with hardware debugging tools, JTAG/SWD, or software‑defined radio (SDR) frameworks.
Familiarity with digital signal processing, wireless security protocols, RF signal processing, and side‑channel analysis.```
"IsExpired": false
#J-18808-Ljbffr
Join the Wireless Sector at Two Six Technologies in Herndon, Virginia, where we push the boundaries of software and firmware reverse engineering to uncover vulnerabilities in wireless and embedded systems. As part of our elite team of security researchers, you’ll work alongside CNO developers and hardware engineers, conducting cutting‑edge vulnerability research on complex, real‑world targets.
What you will do
Reverse engineer wireless and embedded systems, identifying vulnerabilities and assessing their security impact.
Develop proof‑of‑concept exploits for discovered vulnerabilities following DevOps best practices for keeping code bases organized and maintainable.
Analyze firmware, software protections, and wireless protocols to uncover security flaws.
Utilize and develop custom tools to analyze and manipulate software/firmware binaries.
Collaborate closely with CNO developers, vulnerability researchers, and hardware engineers in a fast‑paced, small‑team environment.
Solve complex technical challenges with no predefined solutions.
What You’ll Need (Basic Qualifications)
Bachelor’s (or higher) degree in Computer Science, Computer/Electrical Engineering, or a related field (or equivalent practical experience).
Proficient with programming/scripting languages such as C/C++, Python, and Linux command‑line environments.
Experience with reverse engineering and vulnerability research, using tools such as IDA Pro, Binary Ninja, or Ghidra.
Expertise in one or more of the following:
Firmware analysis (ARM, MIPS, PowerPC, RTOS).
Firmware rehosting using emulation tools such as QEMU.
Fuzzing and exploit development.
Binary obfuscation and anti‑analysis techniques.
Wireless protocols and radio signal analysis.
File system forensics and fault injection frameworks.
Nice to Have (Preferred)
Experience scripting with Binary Ninja API or Ghidra.
Experience in embedded software development using C/C++ for RTOS or Linux environments.
Knowledge of cryptographic security and secure boot mechanisms.
Hands‑on experience working with hardware debugging tools, JTAG/SWD, or software‑defined radio (SDR) frameworks.
Familiarity with digital signal processing, wireless security protocols, RF signal processing, and side‑channel analysis.```
"IsExpired": false
#J-18808-Ljbffr