Posted today
Top Secret
$189,050 - $283,676
Unspecified
IT - Security
Lorton, VA (On-Site/Office)
At Two Six Technologies, we build, deploy, and implement innovative products that solve the world's most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what's possible to empower our team and support our customers in building a safer global future.
Overview of Opportunity
Two Six Technologies is seeking a skilled Principal Mobile Vulnerability Researcher to join our team in northern Virginia. The successful candidate will work on identifying and exploiting vulnerabilities in firmware, applications, and hardware on mobile devices, collaborating with a dedicated team of developers, reverse engineers, and exploitation specialists. A deep passion for cybersecurity, problem-solving, and continuous learning is essential for this role.
Responsibilities:
Minimum Qualifications:
Preferred Qualifications:
Clearance Requirements:
#LI-ZS1
#LI-HYBRID
Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We believe in rewarding skills, experience, and performance. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development.
The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements.
Salary Range
$189,050 - $283,676 USD
Looking for other great opportunities? Check out Two Six Technologies Opportunities for all our Company's current openings!
Ready to make the first move towards growing your career? If so, check out the Two Six Technologies Candidate Journey ! This will give you step-by-step directions on applying, what to expect during the application process, information about our rich benefits and perks along with our most frequently asked questions. If you are undecided and would like to learn more about us and how we are contributing to essential missions, check out our Two Six Technologies News page! We share information about the tech world around us and how we are making an impact! Still have questions, no worries! You can reach us at Contact Two Six Technologies . We are happy to connect and cover the information needed to assist you in reaching your next career milestone.
Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law.
If you are an individual with a disability and would like to request reasonable workplace accommodation for any part of our employment process, please send an email to accommodations@twosixtech.com . Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.
Additionally, please be advised that this business uses E-Verify in its hiring practices.
By submitting the following application, I hereby certify that to the best of my knowledge, the information provided is true and accurate.
Overview of Opportunity
Two Six Technologies is seeking a skilled Principal Mobile Vulnerability Researcher to join our team in northern Virginia. The successful candidate will work on identifying and exploiting vulnerabilities in firmware, applications, and hardware on mobile devices, collaborating with a dedicated team of developers, reverse engineers, and exploitation specialists. A deep passion for cybersecurity, problem-solving, and continuous learning is essential for this role.
Responsibilities:
- Vulnerability Identification and Exploitation: Identify and exploit vulnerabilities such as memory corruption through stack overflows, heap overflows, integer overflows, and logical flaws.
- Exploit Mitigation Bypass: Overcome mitigations like ASLR, code signing, non-executable memory protections, and sandboxing.
- Technique Enhancement: Refine and combine exploitation techniques to assess severity.
- Automation: Automate the identification of vulnerabilities, triggering mechanisms, and optimization of exploits.
- Technical Leadership: Provide technical and functional direction, developing and implementing techniques to ensure customer satisfaction.
Minimum Qualifications:
- Security Clearance: Active Top Secret Clearance.
- Education: BS Degree in Computer Science or related technical fields.
- Experience:
- Proven experience in vulnerability research, reverse engineering, and exploit development on mobile platforms (iOS, Android) or their desktop counterparts (macOS, Linux).
- Minimum of 7 years of experience in programming with languages such as C, C++, and Objective C.
- Proficiency in at least one Assembly language (e.g., x86/64, ARM/64, MIPS).
- Expertise in using disassemblers/decompilers and reverse engineering tools like IDA Pro, Ghidra, Hopper, or Binary Ninja.
- Experience with modern scripting languages such as Python.
- Knowledge: Strong understanding of operating systems, including the separation between kernel and user space.
Preferred Qualifications:
- Wireless Communications: Knowledge of Bluetooth, Wi-Fi, or cellular internals and their interactions with mobile devices.
- Client Interaction: Experience in a client-facing technical role.
- Exploit Mitigations: Familiarity with methods to bypass exploit mitigations and detection techniques.
- Cryptography: Basic understanding of cryptography design and implementation.
- Fuzzing Solutions: Experience with creating and maintaining automated fuzzing solutions.
- Crash Analysis: Expertise in analyzing crash reports for debugging or identifying vulnerabilities.
Clearance Requirements:
- Active Top Secret Clearance.
#LI-ZS1
#LI-HYBRID
Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We believe in rewarding skills, experience, and performance. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development.
The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements.
Salary Range
$189,050 - $283,676 USD
Looking for other great opportunities? Check out Two Six Technologies Opportunities for all our Company's current openings!
Ready to make the first move towards growing your career? If so, check out the Two Six Technologies Candidate Journey ! This will give you step-by-step directions on applying, what to expect during the application process, information about our rich benefits and perks along with our most frequently asked questions. If you are undecided and would like to learn more about us and how we are contributing to essential missions, check out our Two Six Technologies News page! We share information about the tech world around us and how we are making an impact! Still have questions, no worries! You can reach us at Contact Two Six Technologies . We are happy to connect and cover the information needed to assist you in reaching your next career milestone.
Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law.
If you are an individual with a disability and would like to request reasonable workplace accommodation for any part of our employment process, please send an email to accommodations@twosixtech.com . Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.
Additionally, please be advised that this business uses E-Verify in its hiring practices.
By submitting the following application, I hereby certify that to the best of my knowledge, the information provided is true and accurate.
group id: 91123695
Two Six Technologies