Android Vulnerability Researcher

Booz Allen Hamilton Inc.Annapolis Junction, MD
34d

About The Position

Delivers production-grade offensive capabilities that directly enable strategic intelligence collection and cyber effects missions. Discover and operationalize previously unknown vulnerabilities across the Android ecosystem, conducting advanced research on AOSP, OEM implementations, and trusted execution environments. Develop reliable exploits targeting user applications, system components, kernel, TrustZone, and baseband subsystems while engineering persistent CNO implants and infrastructure. Hold responsibilities for large-scale reverse engineering of closed-source binaries, bypassing modern mitigation. Author comprehensive technical documentation, contributing to capability roadmaps and emerging tradecraft, and leveraging AI/LLM-powered tooling to accelerate vulnerability discovery and exploit development. Due to the nature of work performed within this facility, U.S. citizenship is required.

Requirements

  • 3+ years of experience conducting vulnerability research, reverse engineering, or exploit development
  • Experience with C/C++, Python, Java or Kotlin, and the Android NDK/SDK
  • Experience using IDA Pro, Ghidra, Binary Ninja, gdb, LLDB, Jadx, or Frida
  • Experience in successfully discovering and weaponizing vulnerabilities
  • Experience defeating kernel hardening, sandboxing, and attestation mechanisms
  • Experience with GitLab CI/CD for implant build pipelines
  • Knowledge of ARM64 architecture and AArch64 assembly
  • Ability to achieve code execution in ring-0 and TrustZone contexts
  • HS diploma or GED

Nice To Haves

  • Experience in publishing research or tools recognized within the offensive security community
  • Experience providing operational support to IC or DoD cyber mission forces
  • Experience contributing to mobile exploit frameworks or public CVE discoveries

Responsibilities

  • Discover and operationalize previously unknown vulnerabilities across the Android ecosystem
  • Conduct advanced research on AOSP, OEM implementations, and trusted execution environments
  • Develop reliable exploits targeting user applications, system components, kernel, TrustZone, and baseband subsystems
  • Engineer persistent CNO implants and infrastructure
  • Perform large-scale reverse engineering of closed-source binaries, bypassing modern mitigation
  • Author comprehensive technical documentation, contributing to capability roadmaps and emerging tradecraft
  • Leverage AI/LLM-powered tooling to accelerate vulnerability discovery and exploit development

Benefits

  • health, life, disability, financial, and retirement benefits
  • paid leave
  • professional development
  • tuition assistance
  • work-life programs
  • dependent care
  • recognition awards program acknowledges employees for exceptional performance and superior demonstration of our values

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Industry

Professional, Scientific, and Technical Services

Education Level

High school or GED

Number of Employees

1-10 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service