Logo
Two Six Technologies

Senior Vulnerability Researcher

Two Six Technologies, Dayton, Ohio, United States, 45444

Save Job

Overview

At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future. Overview of Opportunity Join the Wireless Sector at Two Six Technologies in Dayton, Ohio, where we push the boundaries of software and firmware reverse engineering to uncover vulnerabilities in wireless and embedded systems. As part of our elite team of security researchers, you’ll work alongside CNO developers and hardware engineers, conducting cutting-edge vulnerability research on complex, real-world targets. Our government customers rely on us to deliver mission-critical security solutions, and we’re looking for a

Senior Vulnerability Researcher

who thrives on reverse engineering embedded systems, discovering security weaknesses, and developing innovative proof-of-concept exploits. If you’re passionate about wireless security, embedded firmware analysis, and making an impact on national security, we want you on our team. Responsibilities

Conduct comprehensive reverse engineering on a variety of embedded systems Perform static and dynamic analysis to find security vulnerabilities in embedded systems Develop proof of concept capabilities to show research progress Document research findings to further the team’s understanding of embedded systems Collaborate with other disciplines to deliver solutions to our customers Qualifications

What you will need (basic qualifications): Bachelor’s Degree in Electrical Engineering, Computer Engineering, Computer Science, or related field Knowledge of *nix operating systems Knowledge of common network protocols TCP/IP, UDP, or HTTP Proficiency with at least one modern debugger such as GDB or WinDBG Proficiency in at least one modern decompiler such as Ghidra, IDA, or Binary Ninja Proficiency in at least one native programming language such as C or C++ Proficiency in at least one scripting language such as Python Proficiency in at least one assembly language such as x86 or ARM Active US Security clearance of Top Secret level and ability to obtain and maintain TS/SCI Nice to have (preferred): Experience conducting vulnerability research on embedded systems Experience with defeating modern migrations such as ASLR, DEP, and Stack Canaries Knowledge of cellular standards such as 4G or 5G Knowledge of low bandwidth communications such as RS485, RS232, CAN Knowledge of Wifi, Bluetooth, Zigbee communication Previous experience in a client-facing technical role Security Clearance

Active US Security clearance of Top Secret level and ability to obtain and maintain TS/SCI Equal Opportunity

Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race, color, religion, national origin, sex, sexual orientation, gender identity or expression, age, marital status, disability, genetic information, or protected veteran status. Accommodation

If you are an individual with a disability and would like to request reasonable workplace accommodation for any part of our employment process, please send an email to accommodations@twosixtech.com. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations. We are an Equal Opportunity Employer

and use E-Verify in our hiring practices where applicable.

#J-18808-Ljbffr