Overview
On Site
100k - 130k
Full Time
Skills
FOCUS
Computer Networking
C
C++
Assembly
x86
ARM
Python
Scripting
GDB
Reverse Engineering
Debugging
Embedded Systems
FPGA
Program Evaluation
Control Flow
Emulation
File Systems
Security Clearance
SAP BASIS
Job Details
Principal Vulnerability Researcher
This company is seeking a Principal Vulnerability Researcher to lead efforts in analyzing and countering malicious software while developing mission-critical cyber capabilities. The ideal candidate will bring deep expertise in reverse engineering, tool development, and advanced exploitation techniques, with a focus on command and control, persistence, and networking.
The company is located in Arlington, VA and will be 5 days onsite a week.
Required Skills & Experience:
Applicants must be currently authorized to work in the United States on a full-time basis now and in the future.
This position doesn't provide sponsorship.
This company is seeking a Principal Vulnerability Researcher to lead efforts in analyzing and countering malicious software while developing mission-critical cyber capabilities. The ideal candidate will bring deep expertise in reverse engineering, tool development, and advanced exploitation techniques, with a focus on command and control, persistence, and networking.
The company is located in Arlington, VA and will be 5 days onsite a week.
Required Skills & Experience:
- Extensive experience reverse engineering compiled programs (C/C++)
- Strong proficiency in reading common assembly languages (x86, x86-64, ARM)
- Hands-on development experience with Python and other scripting languages
- Skilled with debuggers and decompilers (gdb, Binary Ninja, IDA Pro)
- Ability to obtain and maintain a U.S. security clearance
- Experience developing or bypassing mitigations (ASLR, DEP, N^X)
- Expertise defeating anti-reverse engineering techniques (obfuscation, anti-debugging)
- Deep knowledge of embedded platforms (FPGA, physical memory analysis)
- Secure implementation of cryptographic primitives (AES-GCM, SHA256, ECDSA)
- Familiarity with program analysis techniques (control flow, slicing, taint analysis)
- Proficiency with automated analysis tools (fuzzing frameworks, emulation, sandboxing)
- Strong understanding of file systems and executable formats (ELF, PE, Mach-O)
- Ability to communicate effectively with both customers and teammates
- Proven experience developing proof-of-concept exploits
- Active U.S. security clearance (preferred)
Applicants must be currently authorized to work in the United States on a full-time basis now and in the future.
This position doesn't provide sponsorship.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.