full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and … who are passionate about what they do. Together, we'll leverage our collective expertise to drive innovation, solve complex problems, and deliver exceptional results for our clients. Job Summary Vulnerability Researchers at NightWing CODEX analyze systems to understand how they work and how they behave when they break. Candidates must be able to play both sides of the fence More ❯
business possible. This will be dependent on the kind of role you do and part of the business you work in. About the Candidate An interest and aptitude for vulnerability research (either from a professional background or by demonstrating an aptitude). A passion for understanding how things work, testing them, pushing them to their limits, and finding security More ❯
full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and … talented individuals who are passionate about what they do. Together, we'll leverage our collective expertise to drive innovation, solve complex problems, and deliver exceptional results for our clients. Vulnerability Researchers at NightWing CODEX analyze systems to understand how they work and how they behave when they break. Candidates must be able to play both sides of the fence More ❯
Reverse Engineer and VulnerabilityResearcher Join our team at Core One! Our mission is to be at the forefront of devising analytical, operational, and technical solutions to our Nation's most complex national security challenges. In order to achieve our mission, Core One values people first! We are committed to recruiting, nurturing, and retaining top talent! We offer … dynamic, and growing company that values exceptional performance! Are you passionate about contributing to cutting-edge Offensive Cyber Operations? We are seeking a highly skilled Reverse Engineer/Security Researcher to join our dynamic team. In this role, you will play a crucial part in developing and supporting solutions to tackle complex challenges faced by our clients. Responsibilities: Conduct … knowledge. Proficiency with communication and network protocols, hardware bus protocols, and security tools and techniques. If you are enthusiastic about pushing the boundaries of cybersecurity through reverse engineering and vulnerability research, we encourage you to apply and become a valuable member of our team. Core One is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment More ❯
we push the boundaries of what's possible to empower our team and support our customers in building a safer global future. Two Six Technologies is seeking a Principal VulnerabilityResearcher with active Top Secret Clearance to join our team in Arlington, Virginia. The team is growing and looking for someone with a reverse engineering and vulnerability … talk to you if you actively perform in-depth Linux-based reverse engineering! What you will do: Collaborate with team to align capability development roadmaps and complete transfer of vulnerability research prototypes into production environments perform reverse engineering and vulnerability analysis, informing operational parameters for complex system Conducting in-depth reverse engineering and vulnerability analysis across various … scripting in C/C++ and Python within Linux command-line environments, with a strong emphasis on low-level programming, memory management, and system interaction for reverse engineering and vulnerability research. Experience with reverse engineering and vulnerability research, using tools such as IDA Pro, Binary Ninja, or Ghidra. Active US Security clearance of Top Secret level and ability More ❯
to uncover vulnerabilities in wireless and embedded systems. As part of our elite team of security researchers, you'll work alongside CNO developers and hardware engineers, conducting cutting-edge vulnerability research on complex, real-world targets. Our government customers rely on us to deliver mission-critical security solutions, and we're looking for a VulnerabilityResearcher who … Analyze firmware, software protections, and wireless protocols to uncover security flaws. Utilize and develop custom tools to analyze and manipulate software/firmware binaries. Collaborate closely with CNO developers, vulnerability researchers, and hardware engineers in a fast-paced, small-team environment. Solve complex technical challenges with no predefined solutions. What You'll Need (Basic Qualifications): Bachelor's (or higher … or equivalent practical experience). Strong experience with C/C++, Python, and Linux command-line tools for debugging, scripting, and reverse engineering tasks. Experience with reverse engineering and vulnerability research, using tools such as IDA Pro, Binary Ninja, or Ghidra. Expertise in one or more of the following: Firmware analysis (ARM, MIPS, PowerPC, RTOS). Firmware rehosting using More ❯
full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and … talented individuals who are passionate about what they do. Together, we'll leverage our collective expertise to drive innovation, solve complex problems, and deliver exceptional results for our clients. Vulnerability Researchers at Nightwing CODEX analyze systems to understand how they work and how they behave when they break. Candidates must be able to play both sides of the fence … SCI clearance required Active and transferable U.S. government issued TS/SCI security clearance is required prior to start date. 12+ years of professional experience Experience leading teams performing vulnerability research and/or CNO capabilities 4 or more of the following desired skills Desired Skills Understanding of OS Internals (i.e. Windows, Linux, Embedded, etc) Extensive Experience with VulnerabilityMore ❯
in 60 seconds at Summary: Conduct reverse engineering analysis on software and hardware components. Identify and exploit vulnerabilities in systems. Develop tools and techniques to enhance reverse engineering capabilities. VulnerabilityResearcher 1 requires having found at least one significant 0-day in the last year. Qualifications: Experience programming in Assembly, C, C#, C++, Perl, or Python with an … reverse engineering). Candidates who can merge low-level knowledge about compilation of C/C++ code with a nuanced understanding of system design to identify and exploit common vulnerability patterns. Candidates should be comfortable with, at a minimum, user-mode stack-based buffer overflows, and heap-based exploitation strategies. Job Description: Conduct in-depth analysis of software and … hardware components to identify vulnerabilities and potential security risks. Develop and implement reverse engineering techniques to gain a deep understanding of system behavior. Identify and exploit common vulnerability patterns, such as buffer overflows and heap-based vulnerabilities. Create tools and scripts to automate reverse engineering tasks and improve efficiency. Collaborate with other security professionals to share knowledge and expertise. More ❯
countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Job Title: VulnerabilityResearcher Requisition ID: 121396 Location: Gloucester or London - Full-time onsite work required, with consideration for both full and part-time applicants - please speak to your recruiter about … the options Grade: GG10 - GG12 Our world class team of Vulnerability Researchers and Reverse Engineers tackle some of the most interesting problems with a meaningful and tangible impact on the national security of the UK. We are growing our VR team significantly and are looking for a diverse range of talent from experienced Vulnerability Researchers with a proven … IOS), firmware, Linux, IoT and Windows is useful but most important is a willingness to learn as all of our projects bring new and interesting challenges. Job Summary Performing Vulnerability Research and Reverse Engineering to handle complex and unique challenges across a myriad of platforms Learning to use tools like Ghidra, IDA Pro, Unicorn and Frida plus developing bespoke More ❯
countries to collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Job Title: VulnerabilityResearcher Requisition ID: 121399 Location: Manchester - Full-time onsite work required, with consideration for both full and part-time applicants - please speak to your recruiter about the options … Grade: GG10 - GG12 Our world-class team of Vulnerability Researchers and Reverse Engineers tackle some of the most interesting problems with a meaningful and tangible impact on the national security of the UK. We are looking for a diverse range of talent from experienced Vulnerability Researchers with a proven track record, to those with a keen interest and … Windows is useful but most important is a willingness to learn as all of our projects bring new and interesting challenges. What you will be doing for us: Performing Vulnerability Research and Reverse Engineering to handle complex and unique challenges across a myriad of platforms. Learning to use tools like Ghidra, IDA Pro, Unicorn and Frida plus developing bespoke More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
The DarkStar Group
Description The DarkStar Group, a GRVTY Company is seeking a Mobile VulnerabilityResearcher with a TS/SCI + Poly clearance (applicable to this customer) to join one of our top projects in Annapolis Junction, MD. Below is an overview of the project, as well as information on our company, our benefits, and our $25,000 referral program. … THE PROJECT The DarkStar Group's team conducts R&D and prototyping of new CNO capabilities for our customer. The work involves Vulnerability Research, Exploit Development, CNO tool development and enhancement, and infrastructure support (DevOps) for access operations. Platforms involved include iOS, Android, MacOS, Linux, Windows, and other environments. This is some of the most impactful work in the … green-badgers: the team is highly-competent, and the Branch and Section Leads do an excellent job of shielding the engineers from any organizational politics. This team regularly needs Vulnerability Researchers, Exploit Developers, CNO Tool Developers, Reverse Engineers, and other types of technologists. While roles open and close, the program Lead's attitude is "find us good people; we More ❯
full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and … elite team of mission-focused industry experts who are well known for their ability to overcome the most advanced technical challenges. The team comprises engineers of multiple disciplines including vulnerability research, reverse engineering, CNO/CNE development, hardware emulation, system engineering, and data analytics. Our engineers do more than just work with cutting-edge technology-they ensure the missions … depending on program), a peer recognition and reward system and performance-based bonuses. We seek a qualified engineer that can perform as a team member on activities involved with vulnerability research, reverse engineering, and tool development for complex systems. Required Skills TS/SCI Required ability to obtain a CI Poly Working knowledge of vulnerability research (VR) and More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Kudu Dynamics, LLC
VulnerabilityResearcher - Job Description Who We Are: Kudu Dynamics is a Leido's owned company, forged out of a decade of experience in computer networks and staffed with talent who have built, overseen, and enhanced capabilities throughout the entire USG arsenal. Our team of hackers, engineers, makers, and shakers have experience spanning centuries of research, development, and missions … Experience with modern exploitation techniques and mitigations (ASLR, DEP/NX, etc). Experience with modern static or dynamic program analysis techniques Key Responsibilities: Reverse engineering, system understanding, and vulnerability discovery against open and closed-source software products. Conducting experiments on an array of representative products and systems. Critically analyzing, interpreting, and communicating experimental results. Developing software tools to More ❯
Arlington, Virginia, United States Hybrid / WFH Options
SRC
Our client has deep expertise in Vulnerability Research, CNO Development, Reverse Engineering, and Penetration Testing. They support the defense and intelligence communities along with commercial clients. Founded by engineers, they have their own fixed, firm contract, and they work out of their own space. They have strong salaries and team incentive bonuses, provide excellent benefits, and offer … If you have a TS or higher, it's time to learn why our client is a leading employer for cyber engineers in norther Virginia. They are seeking a VulnerabilityResearcher to join their team. Relevant qualifications: -Experience with reverse engineering -Experience with assembly languages (x86, ARM, etc.) -Experience with Python -Experience with debuggers and decompilers Desired: -Experience More ❯
Arlington, Virginia, United States Hybrid / WFH Options
SRC
Our client has deep expertise in Vulnerability Research, CNO Development, Reverse Engineering, and Penetration Testing. They support the defense and intelligence communities along with commercial clients. Founded by engineers, they have their own fixed, firm contract, and they work out of their own space. They have strong salaries and team incentive bonuses, provide excellent benefits, and offer … If you have a TS or higher, it's time to learn why our client is a leading employer for cyber engineers in norther Virginia. They are seeking a VulnerabilityResearcher to join their team. Relevant qualifications: -Experience with reverse engineering -Experience with assembly languages (x86, ARM, etc.) -Experience with Python -Experience with debuggers and decompilers Desired: -Experience More ❯
Arlington, Virginia, United States Hybrid / WFH Options
SRC
Our client has deep expertise in Vulnerability Research, CNO Development, Reverse Engineering, and Penetration Testing. They support the defense and intelligence communities along with commercial clients. Founded by engineers, they have their own fixed, firm contract, and they work out of their own space. They have strong salaries and team incentive bonuses, provide excellent benefits, and offer … If you have a TS or higher, it's time to learn why our client is a leading employer for cyber engineers in norther Virginia. They are seeking a VulnerabilityResearcher to join their team. Relevant qualifications: -Experience with reverse engineering -Experience with assembly languages (x86, ARM, etc.) -Experience with Python -Experience with debuggers and decompilers Desired: -Experience More ❯
Job Number: R VulnerabilityResearcher Key Role: Provide network security research to identify and exploit u nk nown vulnerabilities in code to support our cyber business. Create custom fuzzing sof tware to enumerate and differentiate our delivery. Provide cyber and SIGINT exploitation of large-scale networks and the data riding on them to uncover u nk nown and … competencies. Basic Qualifications: 4+ years of experience with software development, including reading and writing C/C++ and x86/x86_64 assembly languages 3+ years of experience performing vulnerability research or network vulnerability assessments to discover vulnerabilities in modern software Experience with Windows internals, including system architectures, data structures, processes, and security model Experience performing dynamic and … Qualifications: Experience performing exploit development and network analysis Experience creating, developing, or modifying large software solutions as part of a team Ability to create custom fuzzing harnesses to support vulnerability research efforts Bachelor's degree in Computer Science, Computer Engineering, Electrical Engineering, Science, Technology, Engineering, or Mathematics preferred; Master's degree in Computer Science, Computer Engineering, Electrical Engineering, Science More ❯
Where you can find your next, right now. We've got what you're looking for. Job Description: Parsons is seeking a highly talented and driven Reverse Engineer/VulnerabilityResearcher to join our team. As a key member of our team, you will have the opportunity to work on fascinating projects with some of the best professionals … in the industry, exploring the boundaries of vulnerability research. This is an on-site position in Annapolis Junction, MD. Responsibilities: Use reverse engineering techniques to delve into the inner workings of various systems and software to uncover security vulnerabilities Develop proof-of-concept exploits that showcase the impact of vulnerabilities Collaborate with cross-functional teams to ensure products are … required Bachelor's or Master's degree in Computer Science, Information Security, or a related field (can be waived) A minimum of 2 years of hands-on experience in vulnerability research and reverse engineering Experience developing exploits and payloads Strong understanding of low-level systems, software design, and security practices Proficiency in programming languages such as C, Python, and More ❯
UKTL is building leading edge Telecoms testing facilities to keep our telecommunications networks safe, accelerate the roll-out of new technologies, and grow our world leading telecoms sector to maintain resiliency and security. Read more about UKTL here ! Successful candidates More ❯
business possible. This will be dependent on the kind of role you do and part of the business you work in. About the Candidate An interest and aptitude for vulnerability research (either from a professional background or by demonstrating an aptitude) click apply for full job details More ❯
to apply quickly in order to maximise your chances of being considered for an interview Read the complete job description below. About the Candidate An interest and aptitude for vulnerability research (either from a professional background or by demonstrating an aptitude). A ... JBLK1_UKTJ More ❯