Exploitation Specialist

CACIAberdeen Proving Ground, MD
Onsite

About The Position

Join a team that tackles complex hardware security challenges using electromagnetic and voltage fault injection techniques. You'll have the opportunity to research and develop novel attack vectors while leveraging your skills in hardware reverse engineering, circuit analysis, and embedded systems security. As a Exploitation Specialist, you'll work hands-on with state-of-the-art electronics and embedded systems. You'll perform advanced EM/FI attacks, glitching operations, and hardware security assessments on a variety of systems including microcontrollers, secure elements, and IoT devices in support of vulnerability research and defensive countermeasure development.

Requirements

  • Active Top-Secret Clearance with the ability to obtain SCI
  • BS in Cybersecurity Engineering, Computer Engineering, Electrical Engineering, or related discipline and 3-5 years of directly related experience
  • Demonstrated experience with hardware reverse engineering and integrated circuit analysis
  • Proficiency with benchtop equipment including oscilloscopes, signal generators, power analyzers, and multimeters
  • Experience with micro-soldering and circuit board rework
  • Understanding of embedded systems, microcontroller architectures (ARM, x86), and firmware analysis
  • Familiarity with communication protocols (SPI, I2C, UART, JTAG)
  • Proficiency with Python and scripting for automation and data analysis
  • Experience with static and dynamic analysis tools (IDA Pro, Ghidra, or similar)
  • High-proficiency with written and verbal communications
  • Ability to articulate technical concepts and findings to stakeholders to support decision making

Nice To Haves

  • Direct experience with electromagnetic fault injection (EM/FI) or voltage fault injection (VFI/glitching) techniques
  • Experience with ChipWhisperer, Riscure tools, or similar FI platforms
  • Familiarity with laser fault injection or other advanced fault injection methodologies
  • Experience with differential fault analysis (DFA) and side-channel analysis
  • Knowledge of cryptographic implementations and secure boot mechanisms
  • Experience performing penetration tests on embedded systems or IoT devices
  • Familiarity with FPGA programming and ASIC design
  • Experience with machine learning applications in security research
  • Background in failure analysis or physical security testing
  • Experience documenting vulnerability research and writing technical reports

Responsibilities

  • Perform advanced EM/FI attacks, glitching operations, and hardware security assessments on a variety of systems including microcontrollers, secure elements, and IoT devices in support of vulnerability research and defensive countermeasure development.

Benefits

  • flexible time off
  • robust learning resources
  • comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits.
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service