have 5+ years experience • Senior level engineers should have a minimum of 8 years' experience • Reverse engineering and debugging experience using tools such as IDA, Ghidra, OllyDbg • Experience with vulnerabilityresearch and exploit development. • Experience with assembly language x86/64, ARM, MIPS • Development experience in C/C++ and Python • Familiarity with Git and Subversion • Experience with More ❯
cyber solutions in support of critical national security operations and collaborate with a multidisciplinary team of hardware and RF engineers. This role involves deep technical work across reverse engineering, vulnerability assessments, and mobile and embedded systems development. Successful candidates will contribute to full-spectrum cyber capabilities while maintaining a high standard of software assurance and operational relevance. Responsibilities: Perform … software reverse engineering on complex binaries and firmware (x86, ARM, MIPS). Conduct vulnerabilityresearch and analysis across mobile, embedded, and traditional platforms. Develop and integrate secure software solutions targeting Android, iOS, and Windows environments. Implement cryptographic capabilities and steganography techniques to enhance software resilience. Support hardware-based software development, including modification of physical devices. Perform penetration testing More ❯
fundamentals including interrupts, threading, virtual memory, device drivers, boot procedures, and memory management techniques Knowledge of networking and protocol stacks Knowledge of software reverse engineering tools and techniques and vulnerabilityresearch Familiarity with code and resource optimization Programming knowledge/experience with Windows or Linux Kernel, C, C++, Python or Assembly Language (x86 and 64-bit Intel/ More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
The DarkStar Group
benefits, and our $25,000 referral program. THE PROJECT The DarkStar Group's team conducts R&D and prototyping of new CNO capabilities for our customer. The work involves VulnerabilityResearch, Exploit Development, CNO tool development and enhancement, and infrastructure support (DevOps) for access operations. Platforms involved include iOS, Android, MacOS, Linux, Windows, and other environments. This is … green-badgers: the team is highly-competent, and the Branch and Section Leads do an excellent job of shielding the engineers from any organizational politics. This team regularly needs Vulnerability Researchers, Exploit Developers, CNO Tool Developers, Reverse Engineers, and other types of technologists. While roles open and close, the program Lead's attitude is "find us good people; we More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
The DarkStar Group
Description The DarkStar Group, a GRVTY Company is seeking a Mobile Vulnerability Researcher with a TS/SCI + Poly clearance (applicable to this customer) to join one of our top projects in Annapolis Junction, MD. Below is an overview of the project, as well as information on our company, our benefits, and our $25,000 referral program. THE … PROJECT The DarkStar Group's team conducts R&D and prototyping of new CNO capabilities for our customer. The work involves VulnerabilityResearch, Exploit Development, CNO tool development and enhancement, and infrastructure support (DevOps) for access operations. Platforms involved include iOS, Android, MacOS, Linux, Windows, and other environments. This is some of the most impactful work in the … green-badgers: the team is highly-competent, and the Branch and Section Leads do an excellent job of shielding the engineers from any organizational politics. This team regularly needs Vulnerability Researchers, Exploit Developers, CNO Tool Developers, Reverse Engineers, and other types of technologists. While roles open and close, the program Lead's attitude is "find us good people; we More ❯
countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Job Title: Vulnerability Researcher Requisition ID: 121396 Location: Gloucester or London - Full-time onsite work required, with consideration for both full and part-time applicants - please speak to your recruiter about the … options Grade: GG10 - GG12 Our world class team of Vulnerability Researchers and Reverse Engineers tackle some of the most interesting problems with a meaningful and tangible impact on the national security of the UK. We are growing our VR team significantly and are looking for a diverse range of talent from experienced Vulnerability Researchers with a proven track … IOS), firmware, Linux, IoT and Windows is useful but most important is a willingness to learn as all of our projects bring new and interesting challenges. Job Summary Performing VulnerabilityResearch and Reverse Engineering to handle complex and unique challenges across a myriad of platforms Learning to use tools like Ghidra, IDA Pro, Unicorn and Frida plus developing More ❯
countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Job Title: Vulnerability Researcher Requisition ID: 121399 Location: Manchester - Full-time onsite work required, with consideration for both full and part-time applicants - please speak to your recruiter about the options Grade … GG10 - GG12 Our world-class team of Vulnerability Researchers and Reverse Engineers tackle some of the most interesting problems with a meaningful and tangible impact on the national security of the UK. We are looking for a diverse range of talent from experienced Vulnerability Researchers with a proven track record, to those with a keen interest and aptitude … Windows is useful but most important is a willingness to learn as all of our projects bring new and interesting challenges. What you will be doing for us: Performing VulnerabilityResearch and Reverse Engineering to handle complex and unique challenges across a myriad of platforms. Learning to use tools like Ghidra, IDA Pro, Unicorn and Frida plus developing More ❯
in 60 seconds at Summary: Conduct reverse engineering analysis on software and hardware components. Identify and exploit vulnerabilities in systems. Develop tools and techniques to enhance reverse engineering capabilities. Vulnerability Researcher 1 requires having found at least one significant 0-day in the last year. Qualifications: Experience programming in Assembly, C, C#, C++, Perl, or Python with an understanding … reverse engineering). Candidates who can merge low-level knowledge about compilation of C/C++ code with a nuanced understanding of system design to identify and exploit common vulnerability patterns. Candidates should be comfortable with, at a minimum, user-mode stack-based buffer overflows, and heap-based exploitation strategies. Job Description: Conduct in-depth analysis of software and … hardware components to identify vulnerabilities and potential security risks. Develop and implement reverse engineering techniques to gain a deep understanding of system behavior. Identify and exploit common vulnerability patterns, such as buffer overflows and heap-based vulnerabilities. Create tools and scripts to automate reverse engineering tasks and improve efficiency. Collaborate with other security professionals to share knowledge and expertise. More ❯
Strategic Analysis, Inc. (SA) is seeking skilled software engineers to provide project management, technical and programmatic risk analysis, and program-funded test coordination in support of reverse engineering and vulnerabilityresearch at DARPA. Candidates will provide expert technical guidance and recommendations to government stakeholders on vulnerability remediation, secure coding practices, and defensive countermeasures. Candidates will also be … of threat intelligence products, technical reports, and briefings for senior government officials and technical stakeholders, and will be expected to stay abreast of the latest trends in offensive security research, reverse engineering tools and techniques, and emerging exploit methodologies. Required Experience: - Demonstrated skill in conceiving, planning and conducting research in problem areas of considerable scope and complexity requiring … unconventional or novel approaches and sophisticated research techniques. - Technical experience in reverse engineering techniques, identification and exploitation of vulnerabilities in critical systems, and development of mitigation strategies. - Experience with exploit development techniques, shellcode writing, and bypassing security mitigations. - Demonstrated experience with modern software development methodologies (e.g., Agile, DEVOPS/DEVSECOPS). - Demonstrated experience in the use of advanced techniques More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Oracle
of firmware used in the thousands of servers supporting our cloud services. Other responsibilities include: Designing and evaluating complex systems for computer security Scope and execute security assessments and vulnerabilityresearch Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to help engineering teams identify security-related weaknesses Collaborate with engineering teams … Electrical Engineering) 15+ years of relevant experience in one or more of the following areas: software/product security assessments, penetration testing, red teaming, web application assessments Interest in vulnerabilityresearch and exploit development – leading groups of 5 -10 engineers past experience required Understanding of operating systems, CPU instruction sets and their associated security designs Understanding of exploit … e.g. IDA Pro/Ghidra/Frida) Fuzzing (e.g. Jazzer/AFL/Peach) Web Application assessment (e.g. Burp Suite Proxy, ZAP, REST API testing) Proven experience with security research including any published CVEs Experience developing proof of concept exploits bypassing modern exploit mitigations Active participant or organiser of Capture The Flag competitions Knowledge of common vulnerabilities in different More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Oracle
Are you a passionate security researcher with experience assessing large, complex software products? We are looking for talented individuals who are excited about security research and developing creative solutions for some of Oracle’s most critical customers. Finding and combining bugs to create new attacks is essential in this role. Who We Are We are a world-class team … writing a fuzzer for an undocumented network protocol or the grammar of a new programming language. Other responsibilities includes as below Scope and execute in-depth security assessments and vulnerabilityresearch across a broad range of on-premise software, cloud services and infrastructure Perform in-depth security assessments using results from static and dynamic analysis Create testing tools … one of the aforementioned languages, or assisted review with code analysis tools Hands-on experience in one or more of the following with an interest in doing full time research: cybersecurity consulting, security engineering, vulnerability management, risk assessments, bug bounty hunting, malware analysis, forensics OSCP, OSWE certification, or interest in achieving certification Experience navigating and working with extremely More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Kudu Dynamics, LLC
and staffed with talent who have built, overseen, and enhanced capabilities throughout the entire USG arsenal. Our team of hackers, engineers, makers, and shakers have experience spanning centuries of research, development, and operations missions - across desktop, mobile, IoT, and embedded platforms. Kudu Dynamics is uniquely qualified to anticipate tomorrow's threats and build the next generation of capabilities. Job … We distribute our system as a cloud native application that runs on AWS as well as self-managed clouds for on-prem and offline deployments. Our solutions for automating vulnerability discovery and remediation leverages best-of-art techniques built on modern open source software and numerous KUDU proprietary technologies. We are looking for a Software Engineer with strong backend … operations support. While the position focuses on backend services, familiarity with frontend development is beneficial. You will collaborate with various teams, including R&D specialists in reverse engineering and vulnerabilityresearch, to ensure the platform effectively integrates novel analysis techniques. Responsibilities: Software Development: Design, implement, and maintain scalable backend microservices, primarily in Python Develop and integrate REST APIs More ❯
San Antonio, Texas, United States Hybrid / WFH Options
Kudu Dynamics, LLC
and staffed with talent who have built, overseen, and enhanced capabilities throughout the entire USG arsenal. Our team of hackers, engineers, makers, and shakers have experience spanning centuries of research, development, and operations missions - across desktop, mobile, IoT, and embedded platforms. Kudu Dynamics is uniquely qualified to anticipate tomorrow's threats and build the next generation of capabilities. Job … We distribute our system as a cloud native application that runs on AWS as well as self-managed clouds for on-prem and offline deployments. Our solutions for automating vulnerability discovery and remediation leverages best-of-art techniques built on modern open source software and numerous KUDU proprietary technologies. We are looking for a Software Engineer with strong backend … operations support. While the position focuses on backend services, familiarity with frontend development is beneficial. You will collaborate with various teams, including R&D specialists in reverse engineering and vulnerabilityresearch, to ensure the platform effectively integrates novel analysis techniques. Responsibilities: Software Development: Design, implement, and maintain scalable backend microservices, primarily in Python Develop and integrate REST APIs More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
The DarkStar Group
benefits, and our $25,000 referral program. THE PROJECT The DarkStar Group's team conducts R&D and prototyping of new CNO capabilities for our customer. The work involves VulnerabilityResearch, Exploit Development, CNO tool development and enhancement, and infrastructure support (DevOps) for access operations. Platforms involved include iOS, Android, MacOS, Linux, Windows, and other environments. This is … green-badgers: the team is highly-competent, and the Branch and Section Leads do an excellent job of shielding the engineers from any organizational politics. This team regularly needs Vulnerability Researchers, Exploit Developers, CNO Tool Developers, Reverse Engineers, and other types of technologists. While roles open and close, the program Lead's attitude is "find us good people; we … candidate will be working independently as a Software Researcher to identify flaws in software and software architecture design. Additionally, the candidate must be familiar with the latest techniques in vulnerabilityresearch and demonstrate their ability to follow best practices. The candidate must be extremely detail oriented when documenting their research. Often, the candidate will be required to write More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Kudu Dynamics, LLC
and staffed with talent who have built, overseen, and enhanced capabilities throughout the entire USG arsenal. Our team of hackers, engineers, makers, and shakers have experience spanning centuries of research, development, and operations missions - across desktop, mobile, IoT, and embedded platforms. Kudu Dynamics is uniquely qualified to anticipate tomorrow's threats and build the next generation of capabilities. Full … of hardware front ends for observing and generating real-world signals Nice-to-have Qualifications: Software development experience in Python and/or C/C++ Knowledge of software vulnerability classes, vulnerabilityresearch technique Experience with hardware or software reverse engineering Experience with real-time embedded systems Benefits We Provide Equity at a company that is doing More ❯
Arlington, Virginia, United States Hybrid / WFH Options
SRC
Our client has deep expertise in VulnerabilityResearch, CNO Development, Reverse Engineering, and Penetration Testing. They support the defense and intelligence communities along with commercial clients. Founded by engineers, they have their own fixed, firm contract, and they work out of their own space. They have strong salaries and team incentive bonuses, provide excellent benefits, and offer More ❯
Herndon, Virginia, United States Hybrid / WFH Options
Lockheed Martin
From Day One, you will be launched into a realm of thrilling new challenges where you'll be able to leverage your knowledge of OS security features, reverse engineering, vulnerability analysis, networking, firmware, kernel-level development, OS platform internals, etc. Basic Qualifications: - Experience performing Software Development and writing in software languages such as: C, C++, python, Assembly - Demonstrated experience … kernel architecture in operating systems such as: Windows, Linux, MacOS, iOS and Android - Software development experience including design, implementation, testing, analysis and debugging supporting CNO/CNE. - Experience in vulnerabilityresearch and applying various analysis techniques - Experience in reverse engineering in various architectures (i.e. x86, ARM) - Demonstrated in-depth understanding of low level operating systems development and API More ❯
team and support our customers in building a safer global future. Overview of Opportunity: Join our team at Two Six Technologies where you'll immerse yourself in cutting-edge vulnerabilityresearch on a wide range of unique embedded systems. As part of our elite team of researchers, you'll work alongside hardware, software, and network experts to develop More ❯
you'll have the resources, support, and team to do some of the best work of your career. Northrop Grumman Mission Systems is seeking a Sr. Principal Software Engineer: VulnerabilityResearch - Reverse Engineering to join our team in San Antonio, Texas, where you'll get to lead the development of solutions to national security threats with products that … may involve kernel development, reverse engineering or vulnerabilityresearch of network and communication systems. What You'll get to Do: Designs, develops, documents, tests and debugs low level software and systems that contain logical solutions. Conducts multidisciplinary research and collaborates with equipment designers and/or hardware engineers in the planning, design, development, and utilization of electronic … techniques and controls; prepares operating instructions; designs and develops compilers and assemblers, utility programs, and operating systems. Ensures software standards are met. Basic Qualifications for Senior Principal Software Engineer VulnerabilityResearch - Reverse Engineering: Bachelor's degree in STEM discipline such as Computer Science, Computer Engineering, Math, Physics, or Electrical Engineering and 9 years of software engineering experience; Master More ❯
Arlington, Virginia, United States Hybrid / WFH Options
SRC
Our client has deep expertise in VulnerabilityResearch, CNO Development, Reverse Engineering, and Penetration Testing. They support the defense and intelligence communities along with commercial clients. Founded by engineers, they have their own fixed, firm contract, and they work out of their own space. They have strong salaries and team incentive bonuses, provide excellent benefits, and offer … If you have a TS or higher, it's time to learn why our client is a leading employer for cyber engineers in norther Virginia. They are seeking a Vulnerability Researcher to join their team. Relevant qualifications: -Experience with reverse engineering -Experience with assembly languages (x86, ARM, etc.) -Experience with Python -Experience with debuggers and decompilers Desired: -Experience with More ❯
Arlington, Virginia, United States Hybrid / WFH Options
SRC
Our client has deep expertise in VulnerabilityResearch, CNO Development, Reverse Engineering, and Penetration Testing. They support the defense and intelligence communities along with commercial clients. Founded by engineers, they have their own fixed, firm contract, and they work out of their own space. They have strong salaries and team incentive bonuses, provide excellent benefits, and offer … If you have a TS or higher, it's time to learn why our client is a leading employer for cyber engineers in norther Virginia. They are seeking a Vulnerability Researcher to join their team. Relevant qualifications: -Experience with reverse engineering -Experience with assembly languages (x86, ARM, etc.) -Experience with Python -Experience with debuggers and decompilers Desired: -Experience with More ❯
Arlington, Virginia, United States Hybrid / WFH Options
SRC
Our client has deep expertise in VulnerabilityResearch, CNO Development, Reverse Engineering, and Penetration Testing. They support the defense and intelligence communities along with commercial clients. Founded by engineers, they have their own fixed, firm contract, and they work out of their own space. They have strong salaries and team incentive bonuses, provide excellent benefits, and offer … If you have a TS or higher, it's time to learn why our client is a leading employer for cyber engineers in norther Virginia. They are seeking a Vulnerability Researcher to join their team. Relevant qualifications: -Experience with reverse engineering -Experience with assembly languages (x86, ARM, etc.) -Experience with Python -Experience with debuggers and decompilers Desired: -Experience with More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Kudu Dynamics, LLC
Vulnerability Researcher - Job Description Who We Are: Kudu Dynamics is a Leido's owned company, forged out of a decade of experience in computer networks and staffed with talent who have built, overseen, and enhanced capabilities throughout the entire USG arsenal. Our team of hackers, engineers, makers, and shakers have experience spanning centuries of research, development, and missions … Experience with modern exploitation techniques and mitigations (ASLR, DEP/NX, etc). Experience with modern static or dynamic program analysis techniques Key Responsibilities: Reverse engineering, system understanding, and vulnerability discovery against open and closed-source software products. Conducting experiments on an array of representative products and systems. Critically analyzing, interpreting, and communicating experimental results. Developing software tools to More ❯
national security, working on cutting-edge projects that require diverse expertise. Your work will directly impact the development and deployment of crucial cyber capabilities. Key Responsibilities Participate in security research, design, development, verification, and deployment of complex new software. Conduct vulnerabilityresearch and development of cyber capabilities involving desktop and mobile platforms. Support short-range and medium … range customer operations requiring custom solutions. Apply engineering skills in vulnerabilityresearch, reverse engineering, networking, virtualization, and firmware development. Develop software using C, C++, Python, Assembly, and potentially kernel-level development. Required Experience/Clearance 2 years of professional software development experience. Demonstrated experience writing software in Python, C, C++, or similar languages. Demonstrated experience in reverse engineering … vulnerabilityresearch, and exploitation. Development experience in at least one of the following platforms: Linux, Windows, iOS, or Android. Active TS clearance with SCI eligibility is required. Desired Experience In-depth understanding of low-level development at the OS level. Experience with multiple operating systems (Linux, Windows, iOS, Android). Experience with kernel-level development. Familiarity with firmware More ❯
and is involved in the development of anti-tamper/protective technologies, failure analysis, reverse engineering, full spectrum cyber operations, and cyber tool development and solutions. Additionally, MTO conducts vulnerabilityresearch to include hardware exploitation, side-channel attacks, fault-injection attacks, and reverse engineering. MTO is currently working on cutting-edge Science & Technology (S&T) programs for the … is a must, as the Security Engineer will support and contribute to a wide range of activities: providing theoretical and statistical analyses, contributing to hardware security technology development, conducting vulnerability and exploitation assessments, conducting risk assessments, analyzing simulated and measured data, developing models, conducting formal verifications, and providing support to our DoD customers in areas such as Side-Channel … Analysis Cryptography Physically Unclonable Functions (PUFs) Counterfeit detection Hardware Vulnerabilityresearch Anti-Tamper And other topics in the microelectronic security field Depending on candidate skillsets, this position may contribute to multiple Divisions within the Operation. NOTE: This is NOT a Cybersecurity/Information Systems Security/Network Security role - it is more closely aligned with Hardware Design Engineering. More ❯