Cybersecurity Researcher

Two Six TechnologiesEllicott City, MD
2dHybrid

About The Position

At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future. Two Six Technologies is seeking a Cybersecurity Researcher to join our team of dedicated hackers. You’ll immerse yourself in cutting-edge Vulnerability Research on a wide range of unique embedded systems. Working side by side with top-tier CNO developers and hardware engineers, you’ll discover vulnerabilities and create proof of concepts on embedded systems. Our fast-growing roster of government customers relies on us to deliver advanced security solutions, and we’re looking for a Cybersecurity Researcher to help us continue pushing boundaries. If you’re passionate about building tools that make a tangible impact on national security, we want you on our team. The ideal candidate works well with openly/loosely defined project requirements and is able to to self-direct and work independently, including learning new technologies, languages and platforms, etc. The work will be hybrid in our Ellicott City, Maryland office.

Requirements

  • Bachelor’s (or higher) degree in Computer Science, Computer/Electrical Engineering, Mathematics or a related field or 5 years of practical experience
  • Experience writing both proof-of-concept and production level code and accompanying documentation
  • Deep understanding and demonstrated experience of computer architecture, operating systems, programming languages and software vulnerabilities.
  • Deep understanding of x86-64, ARM and/or MIPS assembly
  • Deep understanding of and experience with common vulnerability classes: logic bugs, overflows, etc
  • Deep understanding of common vulnerability mitigations employed in both hardware and software
  • Experience of embedded device security and reverse engineering (e.g., ARM, RTOS).
  • Experience developing, debugging, and scripting in C/C++ and Python within Linux command-line environments, with a strong emphasis on low-level programming, memory management, and system interaction for reverse engineering and vulnerability research.
  • Experience with reverse engineering and vulnerability research, using tools such asIDA/Ghidra, debuggers, etc
  • Deep understanding of common anti-debugging/analysis techniques.
  • Experience working with embedded devices and hands on experience working with hardware and embedded systems.
  • Active Top Secret clearance with eligibility/willingness to obtain a Top Secret/SCI clearance.

Nice To Haves

  • Knowledge of embedded device security and reverse engineering (e.g., ARM, RTOS).
  • Familiarity with cryptography concepts and their implementation.
  • Experience with AI enabled technology a plus
  • Hands-on experience working with hardware and embedded systems.
  • Client-facing experience in technical roles.
  • Prefer active TS/SCI with Poly

Responsibilities

  • Analyze and solve complex technical challenges with no predefined answers.
  • Perform in-depth reverse engineering to identify vulnerabilities, assess their impact, and transform findings into actionable capabilities.
  • Deconstruct and understand the functionality of intricate technical systems.
  • Navigate ambiguity and independently forge paths toward innovative solutions.
  • Collaborate in a small-team environment, where your contributions will have an outsized impact.
  • Leverage your expertise in digital forensics and watermarking to inform secure development practices and maintain data integrity throughout the product lifecycle.
  • Work on projects as a sole contributor and as part of small teams

Benefits

  • medical, dental, and vision insurance
  • life and disability insurance
  • retirement benefits
  • paid leave
  • tuition assistance
  • professional development
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service