Windows Vulnerability Researcher

Booz Allen HamiltonAnnapolis Junction, MD
34d

About The Position

Windows Vulnerability Researcher Key Role: Deliver production-grade offensive capabilities as an expert in Android vulnerability research and exploit development. Discover, weaponize, and operationalize previously unknown vulnerabilities in the Android ecosystem, performing work that directly enables strategic intelligence collection and cyber effects missions. Perform advanced vulnerability research across Windows kernel, user-mode components, Hyper-V, and hardware-assisted security features. Develop reliable exploits targeting user applications, system services, kernel drivers, virtualization layers, and firmware subsystems. Engineer persistent CNO implants and infrastructure using C/C++, Python, and Windows APIs. Reverse engineer closed-source binaries and system components at scale. Bypass modern mitigations such as ASLR, CFG, CET, HVCI, kernel patch protection, driver signature enforcement, and application sandboxing. Author comprehensive technical documentation for delivery and sustainment. Contribute to capability roadmaps and emerging tradecraft development. Utilize AI and LLM-powered tooling to accelerate vulnerability discovery and exploit implementation.

Requirements

  • 3+ years of experience in vulnerability research, reverse engineering, or exploit development
  • Experience using C or C++, Python, and Windows APIs
  • Experience with IDA Pro, Ghidra, Binary Ninja, WinDbg, x64dbg, or ProcDump
  • Experience with vulnerability discovery and weaponization
  • Experience defeating kernel hardening, sandboxing, and attestation mechanisms
  • Experience with GitLab CI/CD for implant build pipelines
  • TS/SCI clearance with a polygraph
  • HS diploma or GED

Nice To Haves

  • Experience publishing research or tools recognized within the offensive security community
  • Experience providing operational support to IC or DoD cyber mission forces
  • Experience contributing to Windows exploit frameworks or public CVE discoveries
  • Knowledge of x86-64 architecture and assembly
  • Ability to achieve code execution in ring-0 and hypervisor contexts

Responsibilities

  • Deliver production-grade offensive capabilities as an expert in Android vulnerability research and exploit development.
  • Discover, weaponize, and operationalize previously unknown vulnerabilities in the Android ecosystem.
  • Perform advanced vulnerability research across Windows kernel, user-mode components, Hyper-V, and hardware-assisted security features.
  • Develop reliable exploits targeting user applications, system services, kernel drivers, virtualization layers, and firmware subsystems.
  • Engineer persistent CNO implants and infrastructure using C/C++, Python, and Windows APIs.
  • Reverse engineer closed-source binaries and system components at scale.
  • Bypass modern mitigations such as ASLR, CFG, CET, HVCI, kernel patch protection, driver signature enforcement, and application sandboxing.
  • Author comprehensive technical documentation for delivery and sustainment.
  • Contribute to capability roadmaps and emerging tradecraft development.
  • Utilize AI and LLM-powered tooling to accelerate vulnerability discovery and exploit implementation.

Benefits

  • Our offerings include health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, work-life programs, and dependent care.
  • Our recognition awards program acknowledges employees for exceptional performance and superior demonstration of our values.
  • Full-time and part-time employees working at least 20 hours a week on a regular basis are eligible to participate in Booz Allen’s benefit programs.
  • Individuals that do not meet the threshold are only eligible for select offerings, not inclusive of health benefits.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service