Senior Wireless Vulnerability Researcher
Lorton, Virginia
Full Time Senior-level / Expert Clearance required USD 109K - 222K
Two Six Technologies
Advancing safety and trust on matters of global importance.At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future.
Overview of Opportunity
Two Six Technologies seeks a skilled Senior Wireless Vulnerability Researcher to support our growing team of experts in vulnerability research, reverse engineering, and exploit development. This role involves conducting cutting-edge security research on Android platforms and wireless communication systems.
This position is hybrid, with up to three days per week on-site with our customer in Lorton, VA. While remote work is currently supported, team members may be required to attend in-person collaboration sessions several times per year for 1–2 weeks at a time. Remote status is subject to change at the customer’s direction.
Key Responsibilities:
- Perform in-depth reverse engineering of mobile software, firmware, and hardware components to identify security flaws.
- Analyze and develop proofs-of-concept for vulnerabilities across a variety of targets, including mobile kernels, applications, and communication protocols.
Discover and exploit vulnerabilities, including those that can lead to memory corruption (e.g., stack overflows, heap overflows, integer overflows), and logical errors in code. - Bypass advanced exploit mitigations such as ASLR, code signing, non-executable memory protections, and sandboxing.
- Refine and integrate exploitation techniques to accurately assess vulnerability severity.
- Automate techniques to identify vulnerabilities, trigger them efficiently, and optimize exploitation processes.
- Lead and mentor a team conducting vulnerability research on mobile technologies—including Android, iOS, and Linux—while providing technical guidance, developing new methods, and ensuring effective implementation of research insights to enhance customer outcomes.
- Clearly document and communicate technical findings through detailed reports and briefings to technical and non-technical audiences.
Minimum Qualifications:
- Bachelor’s degree in Computer Science or a related technical field (strong relevant experience may substitute for specific degree).
- At least 6 years of professional experience in reverse engineering with a focus on mobile devices, operating systems, and protocol analysis, with proficiency in reverse engineering tools such as IDA Pro and Ghidra.
- Expertise in ARM64 architecture with hands-on experience in reverse engineering and an understanding of its properties such as instructions, memory layouts, and effective exploitation approaches.
- Experience in vulnerability research including attack surface assessment, vulnerability discovery through fuzzing or code auditing, and proof-of-concept development.
- Proficiency in software development with low-level programming (C and/or Rust and ARM assembly language).
Preferred Qualifications:
- Deep knowledge of mobile OS (iOS or Android) internals and current security exploitation techniques.
- Experience with wireless communication systems (e.g., Bluetooth, Wi-Fi, cellular) and their interactions with mobile devices.
- Previous experience in a client-facing technical role.
Clearance Requirements:
- Active Top Secret clearance and be able to obtain a SCI and CI polygraph after hire
#LI-JK1
#LI-HYBRID
Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We believe in rewarding skills, experience, and performance. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development.
The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements.
Salary Range$109,600—$222,200 USDLooking for other great opportunities? Check out Two Six Technologies Opportunities for all our Company’s current openings!
Ready to make the first move towards growing your career? If so, check out the Two Six Technologies Candidate Journey! This will give you step-by-step directions on applying, what to expect during the application process, information about our rich benefits and perks along with our most frequently asked questions. If you are undecided and would like to learn more about us and how we are contributing to essential missions, check out our Two Six Technologies News page! We share information about the tech world around us and how we are making an impact! Still have questions, no worries! You can reach us at Contact Two Six Technologies. We are happy to connect and cover the information needed to assist you in reaching your next career milestone.
Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law.
If you are an individual with a disability and would like to request reasonable workplace accommodation for any part of our employment process, please send an email to accommodations@twosixtech.com. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.
Additionally, please be advised that this business uses E-Verify in its hiring practices.
By submitting the following application, I hereby certify that to the best of my knowledge, the information provided is true and accurate.
Tags: Android Audits C Clearance Computer Science Exploit Ghidra IDA Pro iOS Linux Polygraph Reverse engineering Rust Top Secret Top Secret Clearance Vulnerabilities
Perks/benefits: Career development Competitive pay Health care Insurance Medical leave
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.