user avatar

Lead CNO Developer

Two Six Technologies

Posted today
Top Secret
$133,755 - $200,632
Unspecified
IT - Software
Arlington, VA (On-Site/Office)

At Two Six Technologies, we build, deploy, and implement innovative products that solve the world's most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what's possible to empower our team and support our customers in building a safer global future.

Overview of Opportunity

Two Six Technologies is seeking a Lead CNO Developer to join our Trusted Electronics and Effects team supporting an advanced telecommunications research and cyber capability development program.

This is a full-time, in-office position based in our Arlington, Virginia office, where close collaboration across reverse engineering, vulnerability research, and hardware teams is critical to mission success.

This program has conducted deep technical research into telecommunications access mechanisms within defined systems, identifying novel methods that enable system access without traditional interaction. The team is now focused on leveraging that research to perform advanced reverse engineering and vulnerability research, as well as to develop operational tools and capabilities that can be deployed in complex, real-world environments.

As a Lead CNO Developer, you will serve as the technical lead for a small, highly skilled team of developers and researchers. You will provide hands-on technical direction, assign and prioritize tasking, ensure high technical standards, and engage directly with mission partners and stakeholders. You will play a central role in translating research discoveries into scalable, mission-ready cyber capabilities.

What You Will Do
  • Lead the technical direction, execution, and tasking of a small CNO development team
  • Serve as the technical point of contact for project leadership and government stakeholders
  • Design, architect, and develop custom tools and capabilities targeting embedded and telecommunications systems
  • Oversee the development of proofs-of-concept from discovered vulnerabilities and transition them into robust, maintainable operational codebases following DevOps best practices
  • Guide reverse engineering and vulnerability research efforts against complex Linux-based and embedded systems
  • Analyze firmware, operating system internals, wireless protocols, and software protections to uncover exploitable security flaws
  • Direct the development and extension of custom tooling to analyze and manipulate software/firmware binaries
  • Lead capability development leveraging novel telecommunications access mechanisms
  • Provide technical mentorship to junior and mid-level developers
  • Present technical findings, progress updates, and capability demonstrations to transition partners and mission stakeholders

What You Will Need (Minimum Qualifications)
  • Bachelor's degree in Computer Science, Computer Engineering, Electrical Engineering, or a related technical discipline. Equivalent practical experience in security research, reverse engineering, vulnerability research, or exploit development may substitute for a degree
  • 7+ years of experience designing, developing, and prototyping low-level applications or cyber capabilities with familiarity of agile software development processes
  • Demonstrated experience leading small technical teams or serving as a technical lead on complex cyber programs
  • Strong client-facing experience, including briefing technical concepts and engaging directly with government stakeholders
  • Experience tasking and prioritizing technical work in dynamic R&D environments
  • Experience with Python, C, C++, or related systems-level programming languages
  • Experience with operating system internals (privilege models, user groups, binary memory layout)
  • Strong experience with network socket programming and expert packet-level understanding of IP, TCP, and related application-level protocols
  • Experience with reverse engineering x86/ARM binaries or embedded systems
  • Experience tracing code execution in debuggers (WinDbg, GDB, or equivalent)
  • Expertise in one or more of the following areas:
    • Firmware analysis (ARM, RTOS, or similar)
    • Fuzzing and exploit development
    • Wireless protocols with Wireshark
    • File system forensics and fault injection frameworks
    • Scripting with Binary Ninja or Ghidra
    • Binary Ninja API or Ghidra
  • Active U.S. Top Secret security clearance with ability to obtain and maintain SCI access

Nice to Have (Preferred Qualifications)
  • Proven experience identifying and analyzing vulnerabilities in complex applications
  • Knowledge of memory protection mechanisms (ASLR, DEP, etc.)
  • Experience establishing or maintaining CI/CD pipelines and virtualized test ranges
  • Experience with firmware or driver development across Linux, Windows, or embedded systems
  • Strong understanding of memory management (heap, stack, virtual memory, MMU, physical vs. virtual addressing)
  • Experience working with telecommunications systems, including protocol analysis, access mechanisms, or infrastructure components (5G experience a plus)
  • Graduate degree in Computer Science, Computer/Electrical Engineering, or related field

Clearance Requirements:
  • Active U.S. Security clearance of Top Secret level with the ability to obtain/maintain SCI

#LI-ZS1

#LI-ONSITE

Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We believe in rewarding skills, experience, and performance. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development.

The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements.

Salary Range

$133,755 - $200,632 USD

Looking for other great opportunities? Check out Two Six Technologies Opportunities for all our Company's current openings!

Ready to make the first move towards growing your career? If so, check out the Two Six Technologies Candidate Journey ! This will give you step-by-step directions on applying, what to expect during the application process, information about our rich benefits and perks along with our most frequently asked questions. If you are undecided and would like to learn more about us and how we are contributing to essential missions, check out our Two Six Technologies News page! We share information about the tech world around us and how we are making an impact! Still have questions, no worries! You can reach us at Contact Two Six Technologies . We are happy to connect and cover the information needed to assist you in reaching your next career milestone.

Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law.

If you are an individual with a disability and would like to request reasonable workplace accommodation for any part of our employment process, please send an email to accommodations@twosixtech.com . Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.

Additionally, please be advised that this business uses E-Verify in its hiring practices.

By submitting the following application, I hereby certify that to the best of my knowledge, the information provided is true and accurate.
group id: 91123695
N
Name Hidden

Two Six Technologies

job ad image
Find Two Six Technologies on Social Media
Network Employers
user avatar
About Us
Mission Focused. Impact Driven. At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future. Through private R&D, relentless innovation, and deep technical expertise in cyber, information operations, data science, electronic systems, mobility, and user experience, we serve customers that include DARPA, the Department of State, U.S. Cyber Command, the Department of Homeland Security, and beyond.
job ad2 image

Two Six Technologies Jobs


Job Category
IT - Software
Clearance Level
Top Secret