Motion Recruitment
Cleared Principal Security Reverse Engineer
Motion Recruitment, Arlington, Virginia, United States, 22201
Cleared Principal Security Reverse Engineer
Join to apply for the
Cleared Principal Security Reverse Engineer
role at
Motion Recruitment .
If you're looking for impact, this is the role for you. An early‑stage, founder‑led boutique cybersecurity firm focused on CNO development and offensive cyber is looking for a
Principal Reverse Engineer / Vulnerability Researcher . Work directly with co‑founders, shape tooling and tradecraft, and see the real‑world impact of what you build on mission.
What You Will Do
Perform in‑depth reverse engineering of Windows binaries, services, and protocols to identify unusual behaviors, weaknesses, and potential exploitation paths.
Develop proof‑of‑concept (PoC) exploits and technical demonstrations that validate findings and inform offensive capabilities.
Contribute to CNO tooling and tradecraft, from small bespoke utilities to more productized capabilities.
Analyze telemetry and system behavior to surface anomalies and opportunities for collection, persistence, and access.
Work closely with Gauntlet's founders and the prime contractor team to align technical work with mission objectives.
Tech Environment
Platforms: Heavy emphasis on Windows (userland and kernel‑space exposure).
Core Tools: IDA Pro, Ghidra, or similar reverse engineering suites.
Languages: C/C++, Python, assembly, and scripting for automation and PoCs.
Domain: CNO development, offensive cyber, vulnerability discovery and validation, operational tooling.
What We Are Looking For Must‑Haves
5–10+ years of hands‑on experience in reverse engineering, exploit development, vulnerability research, or related low‑level security work.
Active Top Secret clearance (ability to work in SCIF environments).
Deep experience with Windows internals and reverse engineering Windows binaries, applications, or drivers.
Strong fluency in IDA Pro, Ghidra, or similar reverse engineering suites.
Demonstrated ability to go from “this looks weird” to root‑cause analysis to PoC.
Comfort working fully onsite in Herndon, VA or Ballston, VA.
Ability to operate autonomously, own problems end‑to‑end, and communicate clearly with a small, senior team.
Nice‑to‑Haves
Direct experience with CNO development and offensive cyber operations.
Prior work on DoD/IC or large prime contracts (Lockheed, Northrop, Raytheon, etc.).
Experience in kernel‑mode reverse engineering, driver analysis, or deep Windows internals.
Background mentoring other engineers or acting as a technical lead or principal on RE/VR efforts.
Exposure to Linux, embedded, or alternative architectures (ARM, MIPS, etc.) is a plus but not required.
Location and Work Environment
Onsite only: this role cannot be performed remotely.
Worksite options: Herndon, VA or Ballston, VA.
Some SCIF work is required.
Compensation and Benefits
Base Salary: Target $200,000 – $300,000 (flexible based on experience).
401(k) match: 6%.
Comprehensive health insurance coverage.
Cell phone and home internet fully covered.
Training budget for courses, conferences, and tools.
4 weeks paid time off.
11 federal holidays.
Posted by: Virginia Guenno.
#J-18808-Ljbffr
Cleared Principal Security Reverse Engineer
role at
Motion Recruitment .
If you're looking for impact, this is the role for you. An early‑stage, founder‑led boutique cybersecurity firm focused on CNO development and offensive cyber is looking for a
Principal Reverse Engineer / Vulnerability Researcher . Work directly with co‑founders, shape tooling and tradecraft, and see the real‑world impact of what you build on mission.
What You Will Do
Perform in‑depth reverse engineering of Windows binaries, services, and protocols to identify unusual behaviors, weaknesses, and potential exploitation paths.
Develop proof‑of‑concept (PoC) exploits and technical demonstrations that validate findings and inform offensive capabilities.
Contribute to CNO tooling and tradecraft, from small bespoke utilities to more productized capabilities.
Analyze telemetry and system behavior to surface anomalies and opportunities for collection, persistence, and access.
Work closely with Gauntlet's founders and the prime contractor team to align technical work with mission objectives.
Tech Environment
Platforms: Heavy emphasis on Windows (userland and kernel‑space exposure).
Core Tools: IDA Pro, Ghidra, or similar reverse engineering suites.
Languages: C/C++, Python, assembly, and scripting for automation and PoCs.
Domain: CNO development, offensive cyber, vulnerability discovery and validation, operational tooling.
What We Are Looking For Must‑Haves
5–10+ years of hands‑on experience in reverse engineering, exploit development, vulnerability research, or related low‑level security work.
Active Top Secret clearance (ability to work in SCIF environments).
Deep experience with Windows internals and reverse engineering Windows binaries, applications, or drivers.
Strong fluency in IDA Pro, Ghidra, or similar reverse engineering suites.
Demonstrated ability to go from “this looks weird” to root‑cause analysis to PoC.
Comfort working fully onsite in Herndon, VA or Ballston, VA.
Ability to operate autonomously, own problems end‑to‑end, and communicate clearly with a small, senior team.
Nice‑to‑Haves
Direct experience with CNO development and offensive cyber operations.
Prior work on DoD/IC or large prime contracts (Lockheed, Northrop, Raytheon, etc.).
Experience in kernel‑mode reverse engineering, driver analysis, or deep Windows internals.
Background mentoring other engineers or acting as a technical lead or principal on RE/VR efforts.
Exposure to Linux, embedded, or alternative architectures (ARM, MIPS, etc.) is a plus but not required.
Location and Work Environment
Onsite only: this role cannot be performed remotely.
Worksite options: Herndon, VA or Ballston, VA.
Some SCIF work is required.
Compensation and Benefits
Base Salary: Target $200,000 – $300,000 (flexible based on experience).
401(k) match: 6%.
Comprehensive health insurance coverage.
Cell phone and home internet fully covered.
Training budget for courses, conferences, and tools.
4 weeks paid time off.
11 federal holidays.
Posted by: Virginia Guenno.
#J-18808-Ljbffr