Our client is a well-funded cybersecurity firm based in the US, focused on the research and development of next-generation security technologies for hardware and firmware systems. This is a full-time, direct-hire role with a small, highly specialized team doing work that directly impacts national and commercial security infrastructure.
This is a rare opportunity to work on genuinely unsolved problems at the intersection of hardware, firmware, and offensive security research. You'll have the autonomy to lead projects, publish research, and shape how the team operates - all while collaborating with some of the sharpest engineers in the field. If you thrive in ambiguity, love low-level systems, and want your work to matter, this role was built for you.
Required Skills & Experience
- 5+ years of experience in software and/or hardware reverse engineering
- Deep understanding of vulnerability research and exploitation techniques
- Assembly language development experience on at least one major architecture
- Proficiency in C/C++ and Python
- Ability to obtain a US security clearance
- BS in Computer Science, Engineering, or equivalent hands-on experience
Desired Skills & Experience
- Experience with fuzzing and/or side-channel attacks
- Familiarity with ARM, MIPS, or PPC assembly
- Background in government-funded research or proposal writing
- MS or PhD in a technical discipline
What You Will Be Doing
Technical Focus
- ~70% Hands-on reverse engineering of embedded hardware and firmware
- ~20% Exploit development and proof-of-concept research
- ~10% Tooling and automation development
Daily Responsibilities
- ~60% Individual research and technical contributions
- ~25% Leading and mentoring junior engineers
- ~15% Collaboration with customers and internal stakeholders
The Offer
You will receive the following benefits:
- Medical, Dental, and Vision Insurance
Applicants must be currently authorized to work in the US on a full-time basis now and in the future.