Mobile Vulnerability Researcher
Maryland, MD
Full Time Clearance required USD 52K - 123K * est.
REDLattice
REDLattice is redefining the rules of the cyber game. Our mission goes beyond just protecting critical infrastructure—we're boldly exploring cyber strategies that give our nation the upper hand in securing its digital frontier.Job Title: Mobile Vulnerability Researcher
Location: Maryland
At REDLattice, we're redefining the rules of the cyber game. Our mission goes beyond just protecting critical infrastructure—we're boldly exploring cyber strategies that give our nation the upper hand in securing its digital frontier. With cutting-edge tech and brilliant minds, we stay ahead of the curve, identifying and neutralizing threats before they strike. In the fast-paced world of cybersecurity, REDLattice is your innovative partner, using creativity and expertise to outsmart adversaries and keep the digital world safe and sound.
We are driven by impactful and innovative projects that contribute directly to safeguarding our country's critical infrastructure. Our teams are engaged in advanced vulnerability analysis and solutions that meet the complex demands of our mission. With offices in Northern Virginia and Melbourne, Florida, we are expanding rapidly to support the evolving needs of our customers and partners.
Position Overview
REDLattice is seeking a Mobile Vulnerability Researcher to join our elite team in Maryland. In this role, you’ll engage in advanced vulnerability research focused on mobile technologies, working closely with fellow researchers and developers to analyze systems, identify flaws, and develop proof-of-concept code. Candidates must have a strong background in reverse engineering, low-level development, and be comfortable working with complex systems in a collaborative environment.
You will be expected to follow modern best practices, maintain detailed documentation of your research, and write clean, demonstrable code to exploit discovered vulnerabilities.
Key Responsibilities
- Perform vulnerability research on mobile and embedded platforms
- Analyze Linux kernel and device drivers for potential attack surfaces
- Write proof-of-concept code in C, Python, and Assembly (x86/x64)
- Utilize tools like ADB, GDB, and other debuggers for dynamic analysis
- Collaborate with internal research and development teams to share findings and integrate solutions
- Maintain rigorous documentation and reproducibility of research processes
Required Qualifications
- Deep understanding of Linux kernel internals and device drivers
- Strong experience with reverse engineering and exploit development
- Proficiency in assembly language (x86/x64) and low-level debugging
- Advanced development skills in C, Python, and Assembly
- Experience with tools such as ADB, GDB, or similar debugging environments
- Demonstrated ability to work collaboratively with both researchers and software developers
Security Clearance Requirement:
- Active TS/SCI w/ Polygraph
If you’re passionate about vulnerability research, thrive on solving complex technical challenges, and want to contribute to meaningful national security missions, REDLattice is the place for you.
Equal Employment Opportunity Statement: REDLattice is an equal-opportunity employer. We value diversity and strive to create an inclusive environment for all employees. All qualified applicants will receive consideration for employment without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender, gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, or membership in any other group protected by federal, state, or local law. We are committed to creating a work environment that respects and celebrates differences.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: C Clearance Exploit Linux Polygraph Python Reverse engineering Security Clearance TS/SCI Vulnerabilities
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.