About The Position

Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers’ most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. The CODEX (Cyber Offense and Defense Experts) division brings together an elite team of mission-focused industry experts who are well known for their ability to overcome the most advanced technical challenges. The team comprises engineers of multiple disciplines including vulnerability research, reverse engineering, CNO/CNE development, hardware emulation, system engineering, and data analytics. Our engineers do more than just work with cutting-edge technology—they ensure the missions succeed for the customers! CODEX offices span the nation and offer its engineers the ability to advance their careers through mentorship, training, and an expansive technical portfolio that covers every side of cyber. If you want to be part of a collaborative team that supports challenging, meaningful work that is vital to our national security, apply today!

Requirements

  • Typically requires a Bachelor of Science in Computer Science, Computer Engineering, Electrical Engineering, or a related technical field at 10 years of practical experience in a technology-related environment.
  • Solid understanding of software development.
  • Knowledge in any of the following: C, C++, or Python.
  • Knowledge of Windows or Linux.
  • Knowledge of Assembly (x86/x64).
  • Active Top Secret Clearance with the ability to obtain Special Program Access (SAP).

Nice To Haves

  • Master’s Degree Computer Science, Physics, or related STEM field.
  • Expertise in HW/SW Reverse Engineering, Binary Analysis, and disassemblers.
  • Utilizing full system emulation for research and analysis.
  • Embedded system analysis and HW/SW/FW integration.
  • Capture the Flag (CTF) experience.
  • Fuzzer development.
  • Understanding of network protocols and embedded serial communication links (UART, USB, SPI, ETH, PCIe).
  • Commercial and open source forensic analysis tools.
  • Experience creating custom forensic analysis tools.

Responsibilities

  • Use advanced systems to find zero-day (O-day) vulnerabilities.
  • Responsible for analyzing, designing, and identifying programmatic behaviors.
  • Have an opportunity to develop, test, and debug software applications.
  • Research data and provide new design ideas for vulnerability techniques.
  • Understand terminologies like debugging and fuzzing and applying it into your work.
  • Extraction of SW and FW from embedded electronic platforms and systems.
  • Use of program analysis, reverse engineering, and debugging tools (e.g., angr, BAP, IDA Pro, Binary Ninja, gdb, Ghidra, windbg).
  • Document and communicate approach and results effectively to internal teams, customers, and stakeholders.
  • Engage in field tests using specially modified platforms for real-world validation of findings.

Benefits

  • Fostering an inclusive, high-performing workforce capable of solving the nation’s most complex problems.
  • Opportunity to work alongside talented individuals who are passionate about what they do.
  • Leverage collective expertise to drive innovation, solve complex problems, and deliver exceptional results for clients.
  • Support challenging, meaningful work that is vital to national security.
  • Advance careers through mentorship, training, and an expansive technical portfolio.
  • Equal Opportunity/Affirmative Action Employer.
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service