twosixtechnologies
Lead Vulnerability Researcher
At a Glance
- Location
- United States
- Posted
- 2026-02-17T11:17:18-05:00
Key Requirements
Required Skills
Domain Knowledge
- Education
- Embedded Systems
- Engineering
- Insurance
- Medical
Benefits & Perks
edical, dental, and vision insurance, life and disability insurance, retirem
Requirements
Bachelor’s (or higher) degree in Computer Science, Computer/Electrical Engineering, or a related field (or equivalent practical experience)
Experience developing, debugging, and scripting in C/C++ and Python within Linux command-line environments, with a strong emphasis on low-level programming, memory management, and system interaction for reverse engineering and vulnerability research
Experience with reverse engineering and vulnerability research, using tools such as IDA Pro, Binary Ninja, or Ghidra
Expertise in one or more of the following:
Firmware analysis (ARM, MIPS, PowerPC, RTOS)
Firmware rehosting using emulation tools such as QEMU
Responsibilities
Take on complex technical problems for which there is often no known answer
Develop tools and techniques to assist/automate tasks that traditionally require significant manual reverse engineering effort to include Binary patching, Vulnerability research, and Binary fingerprinting
Perform in depth reverse engineering on complex linux based applications
Follow-on development to productize results/PoCs or handoff to developer for productization
Provide technical leadership and direction on multiple ongoing projects, and interface directly with clients/key stakeholders to present findings and gather design constraints