Arlington, Virginia, United States Hybrid / WFH Options
SRC
Our client has deep expertise in VulnerabilityResearch, CNO Development, Reverse Engineering, and Penetration Testing. They support the defense and intelligence communities along with commercial clients. Founded by engineers, they have their own fixed, firm contract, and they work out of their own space. They have strong salaries and team incentive bonuses, provide excellent benefits, and offer … If you have a TS or higher, it's time to learn why our client is a leading employer for cyber engineers in norther Virginia. They are seeking a Vulnerability Researcher to join their team. Relevant qualifications: -Experience with reverse engineering -Experience with assembly languages (x86, ARM, etc.) -Experience with Python -Experience with debuggers and decompilers Desired: -Experience with More ❯
Arlington, Virginia, United States Hybrid / WFH Options
SRC
Our client has deep expertise in VulnerabilityResearch, CNO Development, Reverse Engineering, and Penetration Testing. They support the defense and intelligence communities along with commercial clients. Founded by engineers, they have their own fixed, firm contract, and they work out of their own space. They have strong salaries and team incentive bonuses, provide excellent benefits, and offer … If you have a TS or higher, it's time to learn why our client is a leading employer for cyber engineers in norther Virginia. They are seeking a Vulnerability Researcher to join their team. Relevant qualifications: -Experience with reverse engineering -Experience with assembly languages (x86, ARM, etc.) -Experience with Python -Experience with debuggers and decompilers Desired: -Experience with More ❯
Arlington, Virginia, United States Hybrid / WFH Options
SRC
Our client has deep expertise in VulnerabilityResearch, CNO Development, Reverse Engineering, and Penetration Testing. They support the defense and intelligence communities along with commercial clients. Founded by engineers, they have their own fixed, firm contract, and they work out of their own space. They have strong salaries and team incentive bonuses, provide excellent benefits, and offer … If you have a TS or higher, it's time to learn why our client is a leading employer for cyber engineers in norther Virginia. They are seeking a Vulnerability Researcher to join their team. Relevant qualifications: -Experience with reverse engineering -Experience with assembly languages (x86, ARM, etc.) -Experience with Python -Experience with debuggers and decompilers Desired: -Experience with More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Kudu Dynamics, LLC
Vulnerability Researcher - Job Description Who We Are: Kudu Dynamics is a Leido's owned company, forged out of a decade of experience in computer networks and staffed with talent who have built, overseen, and enhanced capabilities throughout the entire USG arsenal. Our team of hackers, engineers, makers, and shakers have experience spanning centuries of research, development, and missions … Experience with modern exploitation techniques and mitigations (ASLR, DEP/NX, etc). Experience with modern static or dynamic program analysis techniques Key Responsibilities: Reverse engineering, system understanding, and vulnerability discovery against open and closed-source software products. Conducting experiments on an array of representative products and systems. Critically analyzing, interpreting, and communicating experimental results. Developing software tools to More ❯
national security, working on cutting-edge projects that require diverse expertise. Your work will directly impact the development and deployment of crucial cyber capabilities. Key Responsibilities Participate in security research, design, development, verification, and deployment of complex new software. Conduct vulnerabilityresearch and development of cyber capabilities involving desktop and mobile platforms. Support short-range and medium … range customer operations requiring custom solutions. Apply engineering skills in vulnerabilityresearch, reverse engineering, networking, virtualization, and firmware development. Develop software using C, C++, Python, Assembly, and potentially kernel-level development. Required Experience/Clearance 2 years of professional software development experience. Demonstrated experience writing software in Python, C, C++, or similar languages. Demonstrated experience in reverse engineering … vulnerabilityresearch, and exploitation. Development experience in at least one of the following platforms: Linux, Windows, iOS, or Android. Active TS clearance with SCI eligibility is required. Desired Experience In-depth understanding of low-level development at the OS level. Experience with multiple operating systems (Linux, Windows, iOS, Android). Experience with kernel-level development. Familiarity with firmware More ❯
and is involved in the development of anti-tamper/protective technologies, failure analysis, reverse engineering, full spectrum cyber operations, and cyber tool development and solutions. Additionally, MTO conducts vulnerabilityresearch to include hardware exploitation, side-channel attacks, fault-injection attacks, and reverse engineering. MTO is currently working on cutting-edge Science & Technology (S&T) programs for the … is a must, as the Security Engineer will support and contribute to a wide range of activities: providing theoretical and statistical analyses, contributing to hardware security technology development, conducting vulnerability and exploitation assessments, conducting risk assessments, analyzing simulated and measured data, developing models, conducting formal verifications, and providing support to our DoD customers in areas such as Side-Channel … Analysis Cryptography Physically Unclonable Functions (PUFs) Counterfeit detection Hardware Vulnerabilityresearch Anti-Tamper And other topics in the microelectronic security field Depending on candidate skillsets, this position may contribute to multiple Divisions within the Operation. NOTE: This is NOT a Cybersecurity/Information Systems Security/Network Security role - it is more closely aligned with Hardware Design Engineering. More ❯
Boulder, Colorado, United States Hybrid / WFH Options
Kudu Dynamics LLC
and staffed with talent who have built, overseen, and enhanced capabilities throughout the entire USG arsenal. Our team of hackers, engineers, makers, and shakers have experience spanning centuries of research, development, and operations missions - across desktop, mobile, IoT, and embedded platforms. Kudu Dynamics is uniquely qualified to anticipate tomorrow's threats and build the next generation of capabilities. Full … Job Description The Kudu Dynamics Aggressor team of security researchers and software engineers is actively developing an automated firmware vulnerability discovery tool for Internet of Things (IoT) devices. The Aggressor team has generated thousands of potential vulnerabilities and has hundreds of physical devices (IP cameras, wireless routers, etc.) ready for real-world exploit development. Our team is eager to … bring on one to two Software Engineers who are ready to directly contribute in a reverse engineering, vulnerabilityresearch, system emulation, and exploit development role. Responsibilities Reverse engineer commercial IoT devices to get access to firmware and hardware debugging connections Research CVEs and other freely available information to help inform your exploit development Create and demonstrate usable More ❯
Columbia, Maryland, United States Hybrid / WFH Options
Kudu Dynamics, LLC
and staffed with talent who have built, overseen, and enhanced capabilities throughout the entire USG arsenal. Our team of hackers, engineers, makers, and shakers have experience spanning centuries of research, development, and operations missions - across desktop, mobile, IoT, and embedded platforms. Kudu Dynamics is uniquely qualified to anticipate tomorrow's threats and build the next generation of capabilities. Full … Job Description The Kudu Dynamics Aggressor team of security researchers and software engineers is actively developing an automated firmware vulnerability discovery tool for Internet of Things (IoT) devices. The Aggressor team has generated thousands of potential vulnerabilities and has hundreds of physical devices (IP cameras, wireless routers, etc.) ready for real-world exploit development. Our team is eager to … bring on one to two Software Engineers who are ready to directly contribute in a reverse engineering, vulnerabilityresearch, system emulation, and exploit development role. Responsibilities Reverse engineer commercial IoT devices to get access to firmware and hardware debugging connections Research CVEs and other freely available information to help inform your exploit development Create and demonstrate usable More ❯
and cybersecurity , delivering advanced solutions across multiple industries. Their mission is to accelerate autonomous driving and empower smart cities with cutting-edge innovations. Are you passionate about reverse engineering, vulnerabilityresearch, and cutting-edge cybersecurity ? Do you want to work at the forefront of Connected Vehicles, IoT, AI, ICS, and Telecom security? This is your chance to push … the boundaries of cybersecurity innovation ! What You'll Do: ️ Reverse engineer software & hardware components ️ Conduct security research, bug hunting & exploit development ️ Develop cyber threat intelligence & threat models ️ Present research at top global cybersecurity conferences What We're Looking For: At least 2+ years of hands-on reverse engineering experience Proficiency in at least one - IDA Pro, Ghidra, Radare2 … Ability to analyze complex, undocumented protocols & algorithms Why Join? ️ Competitive salary ️ Work on high-impact cybersecurity projects ️ Be part of an international, cutting-edge security team ️ Opportunities for growth, research, and global recognition ️ Full Relocation Package This is a unique opportunity to work on mission-critical cybersecurity projects in a collaborative, high-tech environment. Ready to take on the More ❯
You can also see this job on LinkedIn ) The Company Legion X is a services company headquartered in Arlington, VA that develops on-demand, custom cyber solutions through applied research, prototyping, and engineering services. We are a small, tight-knit company built and run by engineers who pursue the most interesting and impactful cyber vulnerabilityresearch we … can find. We take on tasks like vulnerability assessments, exploit development, cyber vulnerabilityresearch, penetration tests, firmware reverse engineering, hardware reverse engineering, customized test rigs, capability development, and CNO support for both government and commercial customers. Our vision is to be the premier cyber vulnerabilityresearch and red team outfit in the nation. We are … meet these requirements or you will be rejected: -US Citizen with TOP SECRET clearance eligibility -Experience and skillset aligned with the role (firmware reverse engineering experience and skills; cyber vulnerabilityresearch skills; protocol analysis skills; communication skills; self-motivation and drive; clear interest in the work) -We do not have Certification or Degree requirements for this position your More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Kudu Dynamics, LLC
and staffed with talent who have built, overseen, and enhanced capabilities throughout the entire USG arsenal. Our team of hackers, engineers, makers, and shakers have experience spanning centuries of research, development, and operations missions - across desktop, mobile, IoT, and embedded platforms. Kudu Dynamics is uniquely qualified to anticipate tomorrow's threats and build the next generation of capabilities. Full … Job Description The Kudu Dynamics Aggressor team of security researchers and software engineers is actively developing an automated firmware vulnerability discovery tool for Internet of Things (IoT) devices. The Aggressor team has generated thousands of potential vulnerabilities and has hundreds of physical devices (IP cameras, wireless routers, etc.) ready for real-world exploit development. Our team is eager to … bring on one to two Software Engineers who are ready to directly contribute in a reverse engineering, vulnerabilityresearch, system emulation, and exploit development role. Responsibilities Development of new microservices, primarily in Python, to automate the vulnerability discovery process Develop/refine system emulation of IoT devices Use the Aggressor system to generate new potential vulnerabilities from More ❯
and cybersecurity , delivering advanced solutions across multiple industries. Their mission is to accelerate autonomous driving and empower smart cities with cutting-edge innovations. Are you passionate about reverse engineering, vulnerabilityresearch, and cutting-edge cybersecurity ? Do you want to work at the forefront of Connected Vehicles, IoT, AI, ICS, and Telecom security? This is your chance to push … the boundaries of cybersecurity innovation ! What You'll Do: ️ Reverse engineer software & hardware components ️ Conduct security research, bug hunting & exploit development ️ Develop cyber threat intelligence & threat models ️ Present research at top global cybersecurity conferences What We're Looking For: At least 2+ years of hands-on reverse engineering experience Proficiency in at least one - IDA Pro, Ghidra, Radare2 … Ability to analyze complex, undocumented protocols & algorithms Why Join? ️ Competitive salary ️ Work on high-impact cybersecurity projects ️ Be part of an international, cutting-edge security team ️ Opportunities for growth, research, and global recognition ️ Full Relocation Package This is a unique opportunity to work on mission-critical cybersecurity projects in a collaborative, high-tech environment. Ready to take on the More ❯
foundation in various languages to create tools and techniques, perform code analysis, conduct code manipulation and develop coding solutions tailored to the area of need. Offensive development responsibilities include vulnerabilityresearch and analysis, reversing engineering threats to determine methods of exploitation, malware research, researching innovative tools and techniques, developing malicious payloads, and manipulating code execution. Defensive development … networks and net-centric capabilities, as well as detection of, identification of and response to attacks. Secure development environments and software through application security architecture software evaluations web application vulnerability assessment penetration testing and fuzzing, malware research and vulnerability mitigation. Work independently to achieve day-to-day objectives with significant impact on operational results or project deliverables. … conducting root cause analysis (RCA) and implementing corrective actions to prevent future incidents. Collaborate with the security operations center (SOC) to escalate and resolve complex security events. Conduct regular vulnerability scans and assess findings to identify security weaknesses. Assist with the remediation of vulnerabilities by collaborating with system administrators and developers. Participate in security risk assessments to evaluate and More ❯
foundation in various languages to create tools and techniques, perform code analysis, conduct code manipulation and develop coding solutions tailored to the area of need. Offensive development responsibilities include vulnerabilityresearch and analysis, reversing engineering threats to determine methods of exploitation, malware research, researching innovative tools and techniques, developing malicious payloads, and manipulating code execution. Defensive development … networks and net-centric capabilities, as well as detection of, identification of and response to attacks. Securing development environments and software through application security architecture software evaluations web application vulnerability assessment penetration testing and fuzzing, malware research and vulnerability mitigation. Work to achieve key project/program objectives and deliverables. Responsible for entire projects or processes spanning … into DevOps/CI/CD pipelines to enable secure development practices (DevSecOps). Leverage Infrastructure as Code (IaC) to automate security configurations and reduce misconfigurations. Develop and manage vulnerability management programs, ensuring timely remediation of discovered vulnerabilities. Conduct penetration testing, red team/blue team exercises, and security audits to assess and enhance system resilience. Collaborate with system More ❯
self-motivated individuals for our Technical Operator positions to work closely with our Penetration Testers. You should have multiple years conducting targeting in support of cyber operations, specifically conducting vulnerabilityresearch on targets and systems to gain network/system access. You should have experience developing technical operation plans and gaining approval to execute them, briefing options and … relate alternative solutions and risks. • Develop routine proposals incorporating appropriate technical and operational issues into a plan based on consensus. • Write correspondence and coordinate with participants regarding operational plans, vulnerability assessments, risk evaluations, possible remedies, or execution plans. When appropriate, prepare intelligence reports following guidelines. • Ability to analyze the operational environment to identify appropriate equipment/systems required to … operations, incident response or computer forensics. • Ability to interact and communicate with individuals from diverse backgrounds and cultures and to convey technical information to non-technical individuals. • Ability to research, analyze, prioritize, problem solve, synthesize large amounts of data/information, and to work several tasks concurrently with minimal supervision. • Capable of handling stressful situations and demonstrated strong oral More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Kudu Dynamics, LLC
operations and staffed with talent who have built, overseen, and enhanced capabilities through out the entire USG arsenal. Our team of hackers and engineers has experience spanning centuries of research, development, and operations missions across desktop, mobile, IoT, and embedded platforms. Hackers of more than just engineering domains, we have exploited IRS regulations to become an ESOP which is … multiple server products to develop a capability framework and technique plugins for that framework. The candidate will be part of a small, agile team that quickly adapts and applies research knowledge to demonstrate capabilities, from initial analysis of target systems up to developing tools to demonstrate the discoveries of the investigation. Required Qualifications: US citizenship and an active Top … managing automated build and test pipelines Key Responsibilities: Able to work in a small team to design new features/components. Participate in all aspects of the development lifecycle: research, design, develop, test, source control, build, troubleshooting/support, and performance measurement. Taking research findings and building framework plugins to demonstrate concepts Maintaining an automated pipeline for testing More ❯
significant impact on national security. Responsibilities: Engineer and deploy custom software and hardware solutions tailored for both red team (offensive) and blue team (defensive) cyber operations. Conduct in-depth vulnerabilityresearch, perform reverse engineering on emergent threats, and develop sophisticated exploits and payloads to test and validate defenses. Architect and maintain a secure development environment, integrating security into … the software lifecycle through code analysis, penetration testing, and vulnerability mitigation. Deploy, operate, and fine-tune a suite of advanced cybersecurity tools, including Endpoint Detection and Response (EDR), firewalls, and Intrusion Detection/Prevention Systems (IDS/IPS). Serve as a key responder during security incidents, leading investigation efforts from initial detection and analysis through to root cause … determination and remediation. Proactively identify and remediate security weaknesses by conducting continuous vulnerability assessments and managing system patching and configuration. Oversee and strengthen identity and access management (IAM) frameworks, implementing principles of least privilege and managing privileged access and multi-factor authentication systems. Secure and monitor hybrid cloud environments (AWS, Azure, GCP), ensuring security controls are properly configured and More ❯
C/C Python tools for Linux and embedded systems Reverse engineer firmware and analyze low-level network traffic Familiar with Git, Subversion, and Jira toolchains Nice-to-have: vulnerabilityresearch and SIGINT system experience Location: 20755 About SYSTOLIC: SYSTOLIC is dedicated to giving our employees the best possible company experience so that they can focus on providing More ❯
C#, Rust, Assembly. • Experience with developing CNO specific software in Linux/Windows/Embedded applications. Desired Not Required: • Experience with reverse engineering Linux and embedded platforms, and with VulnerabilityResearch and Exploit development. • SIGINT Analysis and CNO is a PLUS More ❯
in varying levels of experience. Reverse Engineer Cryptic Vector is looking for Reverse Engineers with experience or interest in offensive cyber engineering. Reverse Engineering at Cryptic Vector is a research and development position spanning a variety of disciplines. Responsibilities Reverse Engineering (RE) of software/firmware, VulnerabilityResearch (VR), exploit development/productization Design/develop post More ❯
engineering tools and techniques Desired Skills (Optional) Experience with IDA Pro, Ghidra, or similar reverse engineering tools Familiarity with Android internals and security mechanisms Understanding of exploit development or vulnerabilityresearch Ability to work in a fast-paced, mission-driven environment More ❯
from multiple industries to improve their solutions by tackling the root cause of the issues and find innovative solutions to modern challenges. You will have the opportunity to conduct research on latest developments in cybersecurity technologies and threats and understand how this is impacting and changing the Siemens' environment. What you need to make real what matters. Strong academic … software security, EDR and antivirus evasion, C2 setup, automation and scaling of security testing, Active Directory attacks, etc. Demonstrated experience in capture the flag (CTFs) events, bug hunting or vulnerabilityresearch (CVEs) is a plus. You demonstrate an international mindset and are open to travelling and working in a diverse team. You have a great attitude, curiosity, and More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
The DarkStar Group
benefits, and our $25,000 referral program. THE PROJECT The DarkStar Group's team conducts R&D and prototyping of new CNO capabilities for our customer. The work involves VulnerabilityResearch, Exploit Development, CNO tool development and enhancement, and infrastructure support (DevOps) for access operations. Platforms involved include iOS, Android, MacOS, Linux, Windows, and other environments. This is … green-badgers: the team is highly-competent, and the Branch and Section Leads do an excellent job of shielding the engineers from any organizational politics. This team regularly needs Vulnerability Researchers, Exploit Developers, CNO Tool Developers, Reverse Engineers, and other types of technologists. While roles open and close, the program Lead's attitude is "find us good people; we More ❯
skills in reverse engineering to analyze and interpret complex systems and code, supporting national security objectives. The ideal candidate will possess a deep understanding of assembly languages, malware analysis, vulnerabilityresearch, and exploit development, and will contribute to identifying and mitigating cyber threats. REQUIREMENTS The CNO Reverse Engineer I role requires an experienced professional which involves programming in … vulnerabilities that may be used to exploit systems. 3. Perform static and dynamic analysis on executables, using a range of tools and techniques, including disassemblers, decompilers, and debuggers. 4. Research and implement custom analysis tools to assist in identifying novel vulnerabilities and potential exploitation vectors. 5. Support the design, development, and deployment of new tools and techniques to improve … and archival purposes. 7. Work closely with cybersecurity, intelligence, and software development teams to develop and apply mitigation strategies for identified threats. 8. Maintain an understanding of the latest research and trends in reverse engineering, exploit development, and computer network operations. QUALIFICATIONS 1. Proficiency in assembly languages (x86/x64, ARM, etc.). 2. Familiarity with disassembly and debugging More ❯
implementation of cybersecurity solutions in conjunction with the Navy tactical configuration development and associated tactical applications, applying principles and techniques of network engineering, cybersecurity engineering, and systems administration. Conduct vulnerabilityresearch, malware analysis, penetration testing, and reverse engineering development of computer network operations, as required. Conduct installation and integration of Commercial Off-The-Shelf (COTS) cybersecurity tools and More ❯