Trusted Concepts, Inc.
Overview
At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future.
Join the Exploitation Sector of Two Six Technologies— a team of dedicated hackers in Northern Virginia— where you’ll lead vulnerability research across hardware, software, and operational systems. Working side by side with engineers and security researchers, you’ll guide investigations, identify critical vulnerabilities, and develop countermeasures with operational impact. Our fast-growing roster of government customers relies on us to deliver advanced security solutions, and we’re looking for a Lead Vulnerability Researcher to provide technical leadership and mentorship. This role requires regular on-site support at the Laurel, Maryland customer site.
Responsibilities
Lead the identification of vulnerabilities and attacks across hardware, software, personnel, logistics, procedures, and physical security.
Develop proof of concept (PoC) code for identified vulnerabilities.
Reverse‑engineer targeted embedded systems to identify vulnerabilities.
Review source code looking for risks and vulnerabilities.
Analyze the effects of vulnerabilities on mission outcomes and operational effectiveness.
Compare system attack techniques and propose operationally effective countermeasures.
Produce reports, briefings, and perspectives on actual and potential attacks.
Provide technical leadership on research efforts, prioritizing investigations, reviewing methodologies, and overseeing proof‑of‑concepts.
Mentor and guide junior engineers and researchers, reviewing technical approaches and fostering skill development.
Qualifications
Doctorate in Computer Science, Computer/Electrical Engineering, or a related field and 4 years of relevant experience, OR Master’s degree and 6 years of relevant experience, OR Bachelor’s degree and 8 years of relevant experience, OR Associate’s degree and 10 years of relevant experience.
Relevant experience: computer/information systems design/development, programming, information/cyber/network security, reverse‑engineering, vulnerability analysis, penetration testing, computer forensics, information assurance, or systems engineering.
Proficiency in C/C++, Python, and at least one ISA (e.g. x86/ARM/MIPS).
Proficiency in Linux command-line environments.
Experience using a decompiler such as IDA Pro, Binary Ninja, or Ghidra.
Experience using vulnerability research tools such as emulators or fuzzers.
Experience using a software debugger such as GDB or WinDbg.
Ability to work on‑site at Laurel, Maryland customer site regularly.
Nice to Have
Experience translating vulnerabilities into operationally relevant impact assessments and countermeasures.
Experience producing client‑facing technical briefings for operational stakeholders.
Experience using a hardware debugger.
Experience with UART, SPI, I2C.
Experience with common secure communications such as TLS or SSH.
Familiarity with embedded firmware, RTOS, or networked systems.
Familiarity with high‑side environments.
Security Clearance Active TS/SCI clearance with polygraph required.
Compensation Salary range: $168,197 - $252,295 USD (annualized).
Equal Opportunity Employer Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race, color, religion, national origin, sex, sexual orientation, gender identity or expression, age, marital status, disability, genetic information, and protected veteran status.
If you are an individual with a disability and would like to request a reasonable workplace accommodation for any part of our employment process, please send an email to accommodations@twosixtech.com. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.
Additionally, please be advised that this business uses E‑Verify in its hiring practices.
#J-18808-Ljbffr
Join the Exploitation Sector of Two Six Technologies— a team of dedicated hackers in Northern Virginia— where you’ll lead vulnerability research across hardware, software, and operational systems. Working side by side with engineers and security researchers, you’ll guide investigations, identify critical vulnerabilities, and develop countermeasures with operational impact. Our fast-growing roster of government customers relies on us to deliver advanced security solutions, and we’re looking for a Lead Vulnerability Researcher to provide technical leadership and mentorship. This role requires regular on-site support at the Laurel, Maryland customer site.
Responsibilities
Lead the identification of vulnerabilities and attacks across hardware, software, personnel, logistics, procedures, and physical security.
Develop proof of concept (PoC) code for identified vulnerabilities.
Reverse‑engineer targeted embedded systems to identify vulnerabilities.
Review source code looking for risks and vulnerabilities.
Analyze the effects of vulnerabilities on mission outcomes and operational effectiveness.
Compare system attack techniques and propose operationally effective countermeasures.
Produce reports, briefings, and perspectives on actual and potential attacks.
Provide technical leadership on research efforts, prioritizing investigations, reviewing methodologies, and overseeing proof‑of‑concepts.
Mentor and guide junior engineers and researchers, reviewing technical approaches and fostering skill development.
Qualifications
Doctorate in Computer Science, Computer/Electrical Engineering, or a related field and 4 years of relevant experience, OR Master’s degree and 6 years of relevant experience, OR Bachelor’s degree and 8 years of relevant experience, OR Associate’s degree and 10 years of relevant experience.
Relevant experience: computer/information systems design/development, programming, information/cyber/network security, reverse‑engineering, vulnerability analysis, penetration testing, computer forensics, information assurance, or systems engineering.
Proficiency in C/C++, Python, and at least one ISA (e.g. x86/ARM/MIPS).
Proficiency in Linux command-line environments.
Experience using a decompiler such as IDA Pro, Binary Ninja, or Ghidra.
Experience using vulnerability research tools such as emulators or fuzzers.
Experience using a software debugger such as GDB or WinDbg.
Ability to work on‑site at Laurel, Maryland customer site regularly.
Nice to Have
Experience translating vulnerabilities into operationally relevant impact assessments and countermeasures.
Experience producing client‑facing technical briefings for operational stakeholders.
Experience using a hardware debugger.
Experience with UART, SPI, I2C.
Experience with common secure communications such as TLS or SSH.
Familiarity with embedded firmware, RTOS, or networked systems.
Familiarity with high‑side environments.
Security Clearance Active TS/SCI clearance with polygraph required.
Compensation Salary range: $168,197 - $252,295 USD (annualized).
Equal Opportunity Employer Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race, color, religion, national origin, sex, sexual orientation, gender identity or expression, age, marital status, disability, genetic information, and protected veteran status.
If you are an individual with a disability and would like to request a reasonable workplace accommodation for any part of our employment process, please send an email to accommodations@twosixtech.com. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.
Additionally, please be advised that this business uses E‑Verify in its hiring practices.
#J-18808-Ljbffr