Booz Allen Hamilton-posted 8 days ago
Full-time • Mid Level
Annapolis Junction, MD
1-10 employees

Android Vulnerability Researcher Key Role: D elivers production-grade offensive capabilities that directly enable strategic intelligence collection and cyber effects missions. Discover and operationalize previously unknown vulnerabilities across the Android ecosystem, conducting advanced research on AOSP, OEM implementations, and trusted execution environments. Develop reliable exploits targeting user applications, system components, kernel, TrustZone, and baseband subsystems while engineering persistent CNO implants and infrastructure. Hold responsibilities for large-scale reverse engineering of closed-source binaries, bypassing modern mitigation. Author comprehensive technical documentation, contributing to capability roadmaps and emerging tradecraft, and leveraging AI/LLM-powered tooling to accelerate vulnerability discovery and exploit development. Due to the nature of work performed within this facility, U.S. citizenship is required.

  • Delivers production-grade offensive capabilities that directly enable strategic intelligence collection and cyber effects missions.
  • Discover and operationalize previously unknown vulnerabilities across the Android ecosystem, conducting advanced research on AOSP, OEM implementations, and trusted execution environments.
  • Develop reliable exploits targeting user applications, system components, kernel, TrustZone, and baseband subsystems while engineering persistent CNO implants and infrastructure.
  • Hold responsibilities for large-scale reverse engineering of closed-source binaries, bypassing modern mitigation.
  • Author comprehensive technical documentation, contributing to capability roadmaps and emerging tradecraft, and leveraging AI/LLM-powered tooling to accelerate vulnerability discovery and exploit development.
  • 3+ years of experience conducting vulnerability research, reverse engineering, or exploit development
  • Experience with C/C++, Python, Java or Kotlin, and the Android NDK/SDK
  • Experience using IDA Pro, Ghidra, Binary Ninja, gdb, LLDB, Jadx, or Frida
  • Experience in successfully discovering and weaponizing vulnerabilities
  • Experience defeating kernel hardening, sandboxing, and attestation mechanisms
  • Experience with GitLab CI/CD for implant build pipelines
  • Knowledge of ARM64 architecture and AArch64 assembly
  • Ability to achieve code execution in ring-0 and TrustZone contexts
  • HS diploma or GED
  • U.S. citizenship is required
  • Experience in publishing research or tools recognized within the offensive security community
  • Experience providing operational support to IC or DoD cyber mission forces
  • Experience contributing to mobile exploit frameworks or public CVE discoveries
  • health, life, disability, financial, and retirement benefits
  • paid leave, professional development, tuition assistance, work-life programs, and dependent care
  • recognition awards program acknowledges employees for exceptional performance and superior demonstration of our values
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service