twosixtechnologies

Lead Vulnerability Researcher

Apply Now

At a Glance

Location
United States
Posted
2026-02-17T11:17:18-05:00

Key Requirements

Required Skills

LinuxPython

Domain Knowledge

  • Education
  • Embedded Systems
  • Engineering
  • Insurance
  • Medical

Benefits & Perks

Health Insurance

edical, dental, and vision insurance, life and disability insurance, retirem

Requirements

Bachelor’s (or higher) degree in Computer Science, Computer/Electrical Engineering, or a related field (or equivalent practical experience)

Experience developing, debugging, and scripting in C/C++ and Python within Linux command-line environments, with a strong emphasis on low-level programming, memory management, and system interaction for reverse engineering and vulnerability research

Experience with reverse engineering and vulnerability research, using tools such as IDA Pro, Binary Ninja, or Ghidra

Expertise in one or more of the following:

Firmware analysis (ARM, MIPS, PowerPC, RTOS)

Firmware rehosting using emulation tools such as QEMU

Responsibilities

Take on complex technical problems for which there is often no known answer

Develop tools and techniques to assist/automate tasks that traditionally require significant manual reverse engineering effort to include Binary patching, Vulnerability research, and Binary fingerprinting

Perform in depth reverse engineering on complex linux based applications

Follow-on development to productize results/PoCs or handoff to developer for productization

Provide technical leadership and direction on multiple ongoing projects, and interface directly with clients/key stakeholders to present findings and gather design constraints