Overview
On Site
$180,000 - $250,000
Full Time
10% Travel
Skills
professional experience in Windows kernel development with a focus on driver and filter driver design.
Expert-level understanding of Windows internals (memory management
I/O processing / process and thread management)
Strong proficiency in C/C++ / Windows Driver Kit / modern kernel debugging
Experience within the security / cybersecurity space
Background in reverse engineering / malware research / or kernel exploit analysis
Job Details
Our client is looking for a SENIOR KERNEL SOFTWARE DEVELOPER with deep expertise in Windows internals and driver engineering and cybersecurity experience. This individual will architect and maintain low-level system components that serve as the cornerstone of their security platform. You will be at the forefront of creating advanced defense capabilities that operate where attackers least expect resistance - the kernel.
Core Responsibilities
- Architect and implement Windows kernel-mode drivers (file system, registry, network, and related filter technologies) to enable monitoring, policy enforcement, and defensive controls.
- Research and leverage Windows operating system internals to design robust, bypass-resistant protections.
- Collaborate with research teams, user-space developers, and product engineers to integrate kernel-level modules into broader security workflows.
- Perform advanced debugging and crash analysis, using tools such as WinDbg, ETW, and custom diagnostics to identify root causes and performance bottlenecks.
Qualifications
Required Background:
- Prior exposure to the cybersecurity sector
- Minimum 5 years of professional experience in Windows kernel development, with a focus on driver and filter driver design.
- Expert-level understanding of Windows internals (memory management, I/O processing, process and thread management, object manager, etc.).
- Strong proficiency in C/C++, Windows Driver Kit (WDK), and modern kernel debugging methodologies.
- Proven experience within the security space such as EDR, anti-malware, intrusion detection, or kernel-based monitoring solutions.
- Familiarity with exploitation techniques, hooking, and rootkit behaviors, combined with strategies to counter them.
- Demonstrated ability to engineer secure, reliable, and high-performance kernel modules.
Preferred Expertise
- Background in reverse engineering, malware research, or kernel exploit analysis.
- Experience with Microsoft WHQL testing, driver signing, and kernel submission pipelines.
- Contributions to security research communities, open-source kernel projects, or technical publications.
- Knowledge of secure development lifecycle practices and defensive coding strategies for low-level software.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.