Logo
Motion Recruitment

Cleared Principal Security Reverse Engineer

Motion Recruitment, Arlington, Virginia, United States, 22201

Save Job

Cleared Principal Security Reverse Engineer Join to apply for the

Cleared Principal Security Reverse Engineer

role at

Motion Recruitment .

If you're looking for impact, this is the role for you. An early‑stage, founder‑led boutique cybersecurity firm focused on CNO development and offensive cyber is looking for a

Principal Reverse Engineer / Vulnerability Researcher . Work directly with co‑founders, shape tooling and tradecraft, and see the real‑world impact of what you build on mission.

What You Will Do

Perform in‑depth reverse engineering of Windows binaries, services, and protocols to identify unusual behaviors, weaknesses, and potential exploitation paths.

Develop proof‑of‑concept (PoC) exploits and technical demonstrations that validate findings and inform offensive capabilities.

Contribute to CNO tooling and tradecraft, from small bespoke utilities to more productized capabilities.

Analyze telemetry and system behavior to surface anomalies and opportunities for collection, persistence, and access.

Work closely with Gauntlet's founders and the prime contractor team to align technical work with mission objectives.

Tech Environment

Platforms: Heavy emphasis on Windows (userland and kernel‑space exposure).

Core Tools: IDA Pro, Ghidra, or similar reverse engineering suites.

Languages: C/C++, Python, assembly, and scripting for automation and PoCs.

Domain: CNO development, offensive cyber, vulnerability discovery and validation, operational tooling.

What We Are Looking For Must‑Haves

5–10+ years of hands‑on experience in reverse engineering, exploit development, vulnerability research, or related low‑level security work.

Active Top Secret clearance (ability to work in SCIF environments).

Deep experience with Windows internals and reverse engineering Windows binaries, applications, or drivers.

Strong fluency in IDA Pro, Ghidra, or similar reverse engineering suites.

Demonstrated ability to go from “this looks weird” to root‑cause analysis to PoC.

Comfort working fully onsite in Herndon, VA or Ballston, VA.

Ability to operate autonomously, own problems end‑to‑end, and communicate clearly with a small, senior team.

Nice‑to‑Haves

Direct experience with CNO development and offensive cyber operations.

Prior work on DoD/IC or large prime contracts (Lockheed, Northrop, Raytheon, etc.).

Experience in kernel‑mode reverse engineering, driver analysis, or deep Windows internals.

Background mentoring other engineers or acting as a technical lead or principal on RE/VR efforts.

Exposure to Linux, embedded, or alternative architectures (ARM, MIPS, etc.) is a plus but not required.

Location and Work Environment

Onsite only: this role cannot be performed remotely.

Worksite options: Herndon, VA or Ballston, VA.

Some SCIF work is required.

Compensation and Benefits

Base Salary: Target $200,000 – $300,000 (flexible based on experience).

401(k) match: 6%.

Comprehensive health insurance coverage.

Cell phone and home internet fully covered.

Training budget for courses, conferences, and tools.

4 weeks paid time off.

11 federal holidays.

Posted by: Virginia Guenno.

#J-18808-Ljbffr