Two Six Technologies
Senior Software Reverse Engineer
Two Six Technologies, Arlington, Virginia, United States, 22201
Overview of Opportunity
At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future.
Join the Embedded Sector where we push the boundaries of software and firmware reverse engineering to uncover vulnerabilities in wireless and embedded systems. As part of our elite team of security researchers, you’ll work alongside other hardware, software, and network experts, conducting cutting‑edge vulnerability research on complex, real‑world targets.
Our customers rely on us to deliver mission‑critical security solutions, and we’re looking for a
Senior Software Reverse Engineer
who thrives on reverse engineering embedded systems, discovering security weaknesses, and developing innovative proof‑of‑concept exploits. If you’re passionate about cybersecurity, embedded firmware, and making an impact on national security, we want you on our team.
What You’ll Do
Perform high throughput reverse engineering against network devices and other embedded systems, identifying vulnerabilities and assessing their security impact.
Develop proof‑of‑concept exploits for discovered vulnerabilities following DevOps best practices for keeping code bases organized and maintainable.
Analyze firmware, software protections, and protocols to uncover security flaws.
Utilize and develop custom tools to analyze software/firmware binaries.
Collaborate closely with CNO developers, vulnerability researchers, and hardware engineers in a fast‑paced, small‑team environment.
Solve complex technical challenges with no predefined solutions.
Basic Qualifications
Bachelor’s (or higher) degree in Computer Science, Computer/Electrical Engineering, or a related field (or equivalent practical experience).
Experience developing, debugging, and scripting in C/C++ and Python within Linux command‑line environments, with a strong emphasis on low‑level programming, memory management, and system interaction for reverse engineering and vulnerability research.
Experience with reverse engineering and vulnerability research, using tools such as IDA Pro, Binary Ninja, or Ghidra.
Expertise in one or more of the following:
Firmware analysis (ARM, MIPS, PowerPC, RTOS).
Firmware rehosting using emulation tools such as QEMU.
Fuzzing and exploit development.
Binary obfuscation and anti‑analysis techniques.
Wireless protocols and radio signal analysis.
File system forensics and fault injection frameworks.
Nice to Have (Preferred)
Experience in embedded development using C/C++ for RTOS or Linux environments.
Knowledge of cryptographic security and secure boot mechanisms.
Hands‑on experience working with hardware debugging tools, JTAG/SWD, or software‑defined radio (SDR) frameworks.
Familiarity with digital signal processing, RF signal processing, and/or side‑channel analysis.
Client‑facing experience in technical roles.
Security Clearance
Active Top Secret clearance required with eligibility/willingness to obtain a TS/SCI.
Compensation and Benefits Two Six Technologies is committed to providing a competitive and comprehensive compensation package that reflects the value we place on our employees and their contributions. Our offerings include medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development.
Equal Opportunity Employer Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law.
If you are an individual with a disability and would like to request reasonable workplace accommodation for any part of our employment process, please send an email to accommodations@twosixtech.com . Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.
Additionally, please be advised that this business uses E‑Verify in its hiring practices.
#J-18808-Ljbffr
Join the Embedded Sector where we push the boundaries of software and firmware reverse engineering to uncover vulnerabilities in wireless and embedded systems. As part of our elite team of security researchers, you’ll work alongside other hardware, software, and network experts, conducting cutting‑edge vulnerability research on complex, real‑world targets.
Our customers rely on us to deliver mission‑critical security solutions, and we’re looking for a
Senior Software Reverse Engineer
who thrives on reverse engineering embedded systems, discovering security weaknesses, and developing innovative proof‑of‑concept exploits. If you’re passionate about cybersecurity, embedded firmware, and making an impact on national security, we want you on our team.
What You’ll Do
Perform high throughput reverse engineering against network devices and other embedded systems, identifying vulnerabilities and assessing their security impact.
Develop proof‑of‑concept exploits for discovered vulnerabilities following DevOps best practices for keeping code bases organized and maintainable.
Analyze firmware, software protections, and protocols to uncover security flaws.
Utilize and develop custom tools to analyze software/firmware binaries.
Collaborate closely with CNO developers, vulnerability researchers, and hardware engineers in a fast‑paced, small‑team environment.
Solve complex technical challenges with no predefined solutions.
Basic Qualifications
Bachelor’s (or higher) degree in Computer Science, Computer/Electrical Engineering, or a related field (or equivalent practical experience).
Experience developing, debugging, and scripting in C/C++ and Python within Linux command‑line environments, with a strong emphasis on low‑level programming, memory management, and system interaction for reverse engineering and vulnerability research.
Experience with reverse engineering and vulnerability research, using tools such as IDA Pro, Binary Ninja, or Ghidra.
Expertise in one or more of the following:
Firmware analysis (ARM, MIPS, PowerPC, RTOS).
Firmware rehosting using emulation tools such as QEMU.
Fuzzing and exploit development.
Binary obfuscation and anti‑analysis techniques.
Wireless protocols and radio signal analysis.
File system forensics and fault injection frameworks.
Nice to Have (Preferred)
Experience in embedded development using C/C++ for RTOS or Linux environments.
Knowledge of cryptographic security and secure boot mechanisms.
Hands‑on experience working with hardware debugging tools, JTAG/SWD, or software‑defined radio (SDR) frameworks.
Familiarity with digital signal processing, RF signal processing, and/or side‑channel analysis.
Client‑facing experience in technical roles.
Security Clearance
Active Top Secret clearance required with eligibility/willingness to obtain a TS/SCI.
Compensation and Benefits Two Six Technologies is committed to providing a competitive and comprehensive compensation package that reflects the value we place on our employees and their contributions. Our offerings include medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development.
Equal Opportunity Employer Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law.
If you are an individual with a disability and would like to request reasonable workplace accommodation for any part of our employment process, please send an email to accommodations@twosixtech.com . Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.
Additionally, please be advised that this business uses E‑Verify in its hiring practices.
#J-18808-Ljbffr