Junior Vulnerability Researcher (Cloud & Containers)

CACI InternationalFlorham Park, NJ

About The Position

We are seeking a Vulnerability Researcher with a strong background in systems-level engineering and a passion for cloud security. This role is for a practitioner who has moved beyond the basics and is ready to take ownership of research tasks within the "DNA of the cloud." You will apply your knowledge of container internals and binary analysis to hunt for escapes and logic flaws in Kubernetes environments. You will work as part of a high-performing team, executing complex vulnerability research and developing automated tools to secure national cybersecurity infrastructure.

Requirements

  • An active Top Secret clearance.
  • 3–5 years of professional experience in vulnerability research, reverse engineering, or systems-level software development.
  • Proficiency in Go, Rust, or C/C++ and strong scripting skills in Python3.
  • Experience with disassembly and decompilation tools such as IDA Pro, Ghidra, or Binary Ninja.
  • Working knowledge of Linux kernel internals, specifically regarding container isolation (namespaces/cgroups).
  • Hands-on experience with debugging tools like GDB and packet analysis tools like Wireshark.
  • Familiarity with container orchestration (Kubernetes) and the OCI runtime specification.
  • Demonstrated ability to conduct independent technical research and document complex findings.

Nice To Haves

  • An active SCI clearance.
  • Previous experience with fuzzing frameworks and vulnerability discovery in distributed systems.
  • Understanding of x86 or ARM assembly language.
  • Experience with cloud provider security (AWS, Azure, or GCP).
  • Relevant security certifications or a history of participation in advanced CTF competitions.

Responsibilities

  • Execute research into OCI runtimes (runc, crun) and Linux kernel primitives (namespaces, cgroups) to identify breakout and privilege escalation paths.
  • Perform static and dynamic analysis on compiled binaries (Go, Rust, or C++) to map logic and identify potential security vulnerabilities.
  • Develop and maintain custom fuzzing harnesses (e.g., AFL++, libFuzzer) to stress-test gRPC interfaces and microservice components.
  • Use symbolic and concolic execution tools (e.g., Angr, Manticore) to automate the discovery of complex execution paths.
  • Analyze containerized environments and system initialization logic to identify and document potential attack surfaces.
  • Write custom Python3 scripts to automate research workflows, including firmware unpacking and memory analysis.
  • Generate detailed technical reports and documentation for discovered vulnerabilities and research methodology.

Benefits

  • Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
  • We offer competitive compensation, benefits and learning and development opportunities.
  • Our broad and competitive mix of benefits options is designed to support and protect employees and their families.
  • At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits.

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Entry Level

Education Level

No Education Listed

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service