Senior Vulnerability Researcher
Listed on 2026-01-10
-
Engineering
Cybersecurity, Systems Engineer
Overview
At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future.
Overview of Opportunity
Join the Wireless Sector at Two Six Technologies in Dayton, Ohio, where we push the boundaries of software and firmware reverse engineering to uncover vulnerabilities in wireless and embedded systems. As part of our elite team of security researchers, you’ll work alongside CNO developers and hardware engineers, conducting cutting-edge vulnerability research on complex, real-world targets.
Our government customers rely on us to deliver mission-critical security solutions, and we’re looking for a Senior Vulnerability Researcher who thrives on reverse engineering embedded systems, discovering security weaknesses, and developing innovative proof-of-concept exploits. If you’re passionate about wireless security, embedded firmware analysis, and making an impact on national security, we want you on our team.
Responsibilities- Conduct comprehensive reverse engineering on a variety of embedded systems
- Perform static and dynamic analysis to find security vulnerabilities in embedded systems
- Develop proof of concept capabilities to show research progress
- Document research findings to further the team’s understanding of embedded systems
- Collaborate with other disciplines to deliver solutions to our customers
What you will need (basic qualifications):
- Bachelor’s Degree in Electrical Engineering, Computer Engineering, Computer Science, or related field
- Knowledge of
* nix operating systems - Knowledge of common network protocols TCP/IP, UDP, or HTTP
- Proficiency with at least one modern debugger such as GDB or WinDBG
- Proficiency in at least one modern decompiler such as Ghidra, IDA, or Binary Ninja
- Proficiency in at least one native programming language such as C or C++
- Proficiency in at least one scripting language such as Python
- Proficiency in at least one assembly language such as x86 or ARM
- Active US Security clearance of Top Secret level and ability to obtain and maintain TS/SCI
Nice to have (preferred):
- Experience conducting vulnerability research on embedded systems
- Experience with defeating modern migrations such as ASLR, DEP, and Stack Canaries
- Knowledge of cellular standards such as 4G or 5G
- Knowledge of low bandwidth communications such as RS485, RS232, CAN
- Knowledge of Wifi, Bluetooth, Zigbee communication
- Previous experience in a client-facing technical role
- Active US Security clearance of Top Secret level and ability to obtain and maintain TS/SCI
Equal Opportunity Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race, color, religion, national origin, sex, sexual orientation, gender identity or expression, age, marital status, disability, genetic information, or protected veteran status.
Accommodation If you are an individual with a disability and would like to request reasonable workplace accommodation for any part of our employment process, please send an email to Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.
We are an Equal Opportunity Employer and use E-Verify in our hiring practices where applicable.
#J-18808-Ljbffr(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).