Principal Vulnerability Researcher- 5 days onsite Arlington, VA
Arlington, Virginia
Onsite
Full Time
$100k - $130k
Principal Vulnerability Researcher
This company is seeking a Principal Vulnerability Researcher to lead efforts in analyzing and countering malicious software while developing mission-critical cyber capabilities. The ideal candidate will bring deep expertise in reverse engineering, tool development, and advanced exploitation techniques, with a focus on command and control, persistence, and networking.
The company is located in Arlington, VA and will be 5 days onsite a week.
Required Skills & Experience:
Applicants must be currently authorized to work in the United States on a full-time basis now and in the future.
This position doesn’t provide sponsorship.
This company is seeking a Principal Vulnerability Researcher to lead efforts in analyzing and countering malicious software while developing mission-critical cyber capabilities. The ideal candidate will bring deep expertise in reverse engineering, tool development, and advanced exploitation techniques, with a focus on command and control, persistence, and networking.
The company is located in Arlington, VA and will be 5 days onsite a week.
Required Skills & Experience:
- Extensive experience reverse engineering compiled programs (C/C++)
- Strong proficiency in reading common assembly languages (x86, x86-64, ARM)
- Hands-on development experience with Python and other scripting languages
- Skilled with debuggers and decompilers (gdb, Binary Ninja, IDA Pro)
- Ability to obtain and maintain a U.S. security clearance
- Experience developing or bypassing mitigations (ASLR, DEP, N^X)
- Expertise defeating anti-reverse engineering techniques (obfuscation, anti-debugging)
- Deep knowledge of embedded platforms (FPGA, physical memory analysis)
- Secure implementation of cryptographic primitives (AES-GCM, SHA256, ECDSA)
- Familiarity with program analysis techniques (control flow, slicing, taint analysis)
- Proficiency with automated analysis tools (fuzzing frameworks, emulation, sandboxing)
- Strong understanding of file systems and executable formats (ELF, PE, Mach-O)
- Ability to communicate effectively with both customers and teammates
- Proven experience developing proof-of-concept exploits
- Active U.S. security clearance (preferred)
Applicants must be currently authorized to work in the United States on a full-time basis now and in the future.
This position doesn’t provide sponsorship.