Senior CNO Developer

Two Six TechnologiesArlington, VA
8hOnsite

About The Position

At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future. Overview of Opportunity Two Six Technologies is seeking a Senior CNO Developer to join our Trusted Electronics and Effects team supporting an advanced telecommunications research and cyber capability development program. This is a full-time, in-office position based in our Arlington, Virginia office, where close collaboration across reverse engineering, vulnerability research, and hardware teams is critical to mission success. This program has conducted deep technical research into telecommunications access mechanisms within defined systems, identifying novel methods that enable system access without traditional interaction. The team is now focused on leveraging that research to perform advanced reverse engineering and vulnerability research, as well as to develop operational tools and capabilities that can be deployed in complex, real-world environments. In this role, you will work alongside reverse engineers and vulnerability researchers to transform cutting-edge research into mission-ready cyber capabilities. You will be part of a small, highly collaborative team building custom software tools and evolving innovative proofs-of-concept into robust operational solutions.

Requirements

  • Bachelor’s degree in Computer Science, Computer/Electrical Engineering, or related scientific discipline
  • Minimum 5 years of experience designing and/or prototyping applications using agile software development processes
  • Minimum 2 years of experience with one or more of the following: Python, C, C++
  • Minimum 2 years of experience with operating system internals (privilege models, user groups, binary memory layout)
  • At least 2 years of experience with network socket programming and expert packet-level understanding of IP, TCP, and related application-level protocols
  • At least 2 years of experience with reverse engineering x86/ARM binaries or embedded systems
  • Experience tracing code execution in debuggers (WinDbg, GDB, or equivalent)
  • Expertise in one or more of the following areas: Firmware analysis (ARM, RTOS, or similar) Fuzzing and exploit development Wireless protocols through Wireshark File system forensics and fault injection frameworks Scripting with Binary Ninja or Ghidra Binary Ninja API or Ghidra
  • Active U.S. Top Secret security clearance with ability to obtain and maintain SCI access

Nice To Haves

  • Familiarity with identifying and analyzing vulnerabilities in complex applications
  • Knowledge of memory protection mechanisms (ASLR, DEP, etc.)
  • Experience with CI/CD pipelines and virtualized test ranges
  • Experience with firmware or driver development across Linux, Windows, or embedded systems
  • Strong understanding of memory management (heap, stack, virtual memory, MMU, physical vs. virtual addressing)
  • Experience working with telecommunications systems, including protocol analysis, access mechanisms, or infrastructure components (5G experience a plus)
  • Graduate degree in Computer Science, Computer/Electrical Engineering, or related field

Responsibilities

  • Design and develop custom tools and software targeting embedded and telecommunications systems
  • Serve as a cyber capability developer on a small, highly motivated team
  • Develop proofs-of-concept from discovered vulnerabilities and transition them into robust, maintainable codebases following DevOps best practices
  • Analyze firmware, software protections, operating system internals, and wireless protocols to uncover exploitable security flaws
  • Conduct reverse engineering and vulnerability research against complex Linux-based and embedded systems
  • Utilize and extend custom tools to analyze and manipulate software/firmware binaries
  • Develop capabilities that leverage novel telecommunications access mechanisms
  • Collaborate closely with developers, vulnerability researchers, and hardware engineers in a fast-paced environment
  • Solve complex, ambiguous technical challenges with limited prior experience
  • Engage in technical discussions with transition partners and mission stakeholders

Benefits

  • medical, dental, and vision insurance
  • life and disability insurance
  • retirement benefits
  • paid leave
  • tuition assistance
  • professional development
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service