Research Innovations Incorporated
DoD SkillBridge Vulnerability Researcher (Cyber199)
Research Innovations Incorporated, St. Pete Beach, Florida, United States
DoD SkillBridge Vulnerability Researcher (Cyber199)
Research Innovations, Inc. (RII) is breaking through the big, slow, status‑quo with transformative technology that fundamentally changes and improves the world. We develop cutting‑edge software for all levels of the government and military, using agile development practices and user‑centered design to create innovative solutions for complex real‑world problems.
We are seeking a dedicated Vulnerability Research SkillBridge candidate to join our Cyber Security team. In this role you will play a pivotal part in solving unique and challenging problems for our Defense and Homeland Security customers. The position requires a proactive mindset, deep technical expertise in vulnerability research, reverse engineering, and exploit mitigation/bypass, as well as a drive to live one of our core values:
Get s#!t done . This opportunity is specifically for members of the DoD who are transitioning back to civilian life and can take advantage of programs such as SkillBridge. RII has strong connections to the military community and helps you navigate the challenges of transition.
This position requires an active US Secret security clearance.
What You Will Be Doing
Conducting in-depth reverse engineering and vulnerability analysis across various architectures and platforms, including x86/64, ARM, PowerPC, and more.
Researching and analyzing operating system and application internals, identifying and understanding security strengths and weaknesses of those systems.
Developing and enhancing functionality by adding features and capabilities to undocumented interfaces.
Modeling and analyzing in‑memory compiled application behavior to identify potential vulnerabilities and improve security measures.
Developing and understanding mobile/embedded systems and kernel modules, particularly related to vulnerability research.
Participating actively in our extensive Vulnerability Research mentorship program, sharing knowledge and collaborating with colleagues.
What You Have Done
Proficient understanding of wireless networking and associated security protocols, such as Wi‑Fi.
Strong grasp of legacy exploit mitigations and bypass techniques, including but not limited to ASLR, DEP/NX, Stack Cookies (Canaries), and Control Flow Integrity (CFI). Experience in identifying and circumventing these security measures.
In‑depth knowledge of both security and network fundamentals, such as cryptography, authentication, access control, and network protocols (TCP/IP, UDP, DNS, HTTP, etc.).
Programming experience with both scripted languages (preferably Python3) and compiled languages (preferably C). Ability to write efficient and secure code for vulnerability research and exploit development purposes.
Familiarity with low‑level architectures such as x86, ARM, or MIPS.
Experience with operating system internals and implementations, including Windows, Linux, or macOS.
Excellent oral, written, and interpersonal communication skills, with the ability to effectively convey complex technical concepts and interact with customers and team members alike.
EVEN BETTER
Experience with vulnerability research and reverse engineering of real‑time operating systems (RTOS), such as FreeRTOS, QNX, or VxWorks.
Bachelor's or postgraduate degree in Computer Science, Computer Engineering, or a related field.
Experience with software protection and binary armoring techniques, such as anti‑debugging, code obfuscation, or tamper resistance.
Proficiency in agile development methodologies, including Scrum or Kanban.
Familiarity with low‑level iOS/Android development and associated security considerations.
Knowledge of hypervisors and their security implications.
Proficiency in malware analysis, including static and dynamic techniques, behavioral analysis, and code deobfuscation.
Experience with constraint solving techniques, such as symbolic execution, theorem proving, or model checking.
Background in machine learning, particularly for vulnerability analysis and detection.
We work to help your intellectual passions and creativity thrive. It’s one of our core values:
Let your geek flag fly . We also offer new employees comprehensive benefits, including flexible work schedules, health insurance coverage, paid time off, 401(k) with a company match, paid parental leave, wellness programs, and more—all from day one.
It’s all part of another of our core values:
Stay human . That’s why we provide comfortable, colorful offices, community game rooms, pantries, massage chairs, escape rooms, and regular community events.
Research Innovations, Inc. is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender, gender identity or expression, national origin, genetics, disability status, protected veteran status, age, or any other characteristic protected by state, federal or local law.
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
#J-18808-Ljbffr
We are seeking a dedicated Vulnerability Research SkillBridge candidate to join our Cyber Security team. In this role you will play a pivotal part in solving unique and challenging problems for our Defense and Homeland Security customers. The position requires a proactive mindset, deep technical expertise in vulnerability research, reverse engineering, and exploit mitigation/bypass, as well as a drive to live one of our core values:
Get s#!t done . This opportunity is specifically for members of the DoD who are transitioning back to civilian life and can take advantage of programs such as SkillBridge. RII has strong connections to the military community and helps you navigate the challenges of transition.
This position requires an active US Secret security clearance.
What You Will Be Doing
Conducting in-depth reverse engineering and vulnerability analysis across various architectures and platforms, including x86/64, ARM, PowerPC, and more.
Researching and analyzing operating system and application internals, identifying and understanding security strengths and weaknesses of those systems.
Developing and enhancing functionality by adding features and capabilities to undocumented interfaces.
Modeling and analyzing in‑memory compiled application behavior to identify potential vulnerabilities and improve security measures.
Developing and understanding mobile/embedded systems and kernel modules, particularly related to vulnerability research.
Participating actively in our extensive Vulnerability Research mentorship program, sharing knowledge and collaborating with colleagues.
What You Have Done
Proficient understanding of wireless networking and associated security protocols, such as Wi‑Fi.
Strong grasp of legacy exploit mitigations and bypass techniques, including but not limited to ASLR, DEP/NX, Stack Cookies (Canaries), and Control Flow Integrity (CFI). Experience in identifying and circumventing these security measures.
In‑depth knowledge of both security and network fundamentals, such as cryptography, authentication, access control, and network protocols (TCP/IP, UDP, DNS, HTTP, etc.).
Programming experience with both scripted languages (preferably Python3) and compiled languages (preferably C). Ability to write efficient and secure code for vulnerability research and exploit development purposes.
Familiarity with low‑level architectures such as x86, ARM, or MIPS.
Experience with operating system internals and implementations, including Windows, Linux, or macOS.
Excellent oral, written, and interpersonal communication skills, with the ability to effectively convey complex technical concepts and interact with customers and team members alike.
EVEN BETTER
Experience with vulnerability research and reverse engineering of real‑time operating systems (RTOS), such as FreeRTOS, QNX, or VxWorks.
Bachelor's or postgraduate degree in Computer Science, Computer Engineering, or a related field.
Experience with software protection and binary armoring techniques, such as anti‑debugging, code obfuscation, or tamper resistance.
Proficiency in agile development methodologies, including Scrum or Kanban.
Familiarity with low‑level iOS/Android development and associated security considerations.
Knowledge of hypervisors and their security implications.
Proficiency in malware analysis, including static and dynamic techniques, behavioral analysis, and code deobfuscation.
Experience with constraint solving techniques, such as symbolic execution, theorem proving, or model checking.
Background in machine learning, particularly for vulnerability analysis and detection.
We work to help your intellectual passions and creativity thrive. It’s one of our core values:
Let your geek flag fly . We also offer new employees comprehensive benefits, including flexible work schedules, health insurance coverage, paid time off, 401(k) with a company match, paid parental leave, wellness programs, and more—all from day one.
It’s all part of another of our core values:
Stay human . That’s why we provide comfortable, colorful offices, community game rooms, pantries, massage chairs, escape rooms, and regular community events.
Research Innovations, Inc. is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender, gender identity or expression, national origin, genetics, disability status, protected veteran status, age, or any other characteristic protected by state, federal or local law.
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
#J-18808-Ljbffr