Position Overview
We have an immediate opening for a Vulnerability Researcher to support our Government Client in Reston, VA. In this role, you will be at the forefront of providing a full spectrum of network exploitation capabilities. From tackling major, well-known electronics systems to custom, hard-to-find, one-off platforms, you will play a pivotal role in solving complex target problems for our valued customers.
Responsibilities
As a Vulnerability Researcher, you will be responsible for a wide range of tasks, including:
- Conducting initial vulnerability research to identify weaknesses in systems.
- Reverse engineering various software and hardware components.
- Debugging and emulation of systems and software.
- Providing our customers with cutting-edge performance and results in the field of network exploitation.
Required Qualifications
To be considered for this position, candidates must meet the following qualifications:
-
Understanding of Common Architectures: Demonstrated proficiency in understanding at least one common architecture (e.g., x86, ARM, MIPS, or other architectures).
-
Exploitation Expertise: Experience with modern exploitation techniques, exploit mitigation techniques, software protections, or binary armoring.
-
Operating Systems Familiarity: Experience working with operating systems internals for at least one of the common operating systems such as Windows, MacOS, iOS, Android, or Linux.
-
Scripting Skills: Proficiency with at least one scripting language such as Python, Ruby, Bash, or Powershell.
-
Problem-Solving: Exceptional problem-solving skills.
-
Autonomous Learning: Ability to work and learn new technologies autonomously.
-
Security Clearance: A current TS/SCI Clearance with CI polygraph is required for this role, or candidates should have the ability to obtain polygraph clearance before the start date.
Preferred Qualifications
Preferred qualifications that will set you apart include:
-
Software Analysis: Experience with static and dynamic analysis of software.
-
Embedded Systems Knowledge: Experience with embedded systems, including UART, bootloaders, device flashing, and cross-platform build chains.
-
Reverse Engineering: Exposure to reverse engineering ARM, PPC, or MIPS binaries.
-
Debugging Proficiency: Proficiency with hardware/software debugging techniques.
-
Low-Level Language Skills: Software development experience with low-level languages (e.g., C/C++).
-
Kernel Debugging: Experience with kernel debugging and device driver development.
-
Malware Expertise: Malware analysis and malware repurposing experience.
-
Fuzzing and System Emulation: Proficiency with fuzzing and system emulation.
If you possess the required qualifications and are eager to contribute your expertise to the field of vulnerability research while working on challenging and diverse projects in Reston, VA, we encourage you to apply for the Vulnerability Researcher position. Your contributions will be essential in addressing complex target problems for our Government Client.