Two Six Technologies - Technical Lead, Principal, and Senior Principal Vulnerability Researcher
Upload My Resume
Drop here or click to browse · Tap to choose · PDF, DOCX, DOC, RTF, TXT
Requirements
• Demonstrated expertise in advanced cybersecurity research concepts typically acquired in a similar technical role. • Expert-level proficiency in two or more of the following: low-level programming (C/C++, Assembly) and the use of industry-standard disassemblers and decompilers, binary re-hosting frameworks to enable dynamic analysis, and building custom greybox/blackbox fuzzing harnesses. • Proven experience in vulnerability research (VR), including attack surface triage, identifying vulnerabilities, and developing proof-of-concept exploits to demonstrate security impact. • Extensive experience in technical mentorship and training, with a history of providing thorough solutions to complex problems and guiding less experienced team members. • Experience leading complex technical projects in reverse engineering/vulnerability research (RE/VR) or R&D for National Security customers. • Experience delivering high‑quality technical documentation—such as vulnerability research and findings, industry white papers, and competitive proposals—that distills complex cybersecurity concepts for diverse audiences. • Experience in a client-facing technical role, demonstrating strong communication and stakeholder management skills. • Active Top Secret clearance and willingness to obtain and maintain an SCI clearance. • Master’s or PhD in Computer Science, Engineering, or a related field. • Familiarity with embedded systems binary reverse engineering (e.g., ARM/MIPS/PPC arch, RTOS, Linux, Baremetal) or cryptographic design principles. • Experience in trusted computing design and implementation principles. • Experience with digital signals (e.g., UART, JTAG, SPI, I2C) or network protocol analysis. • Experience with accelerated RE/VR tools that speed up discovery, analysis, and validation. • Recognized standing within the external technical community, including experience in publishing articles or speaking at external engagements. • Security Clearance: • Security Clearance: • Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We believe in rewarding skills, experience, and performance. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development. • The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements. • $207,598 - $311,397 USD • Looking for other great opportunities? Check out Two Six Technologies Opportunities for all our Company’s current openings! • Ready to make the first move towards growing your career? If so, check out the Two Six Technologies Candidate Journey! This will give you step-by-step directions on applying, what to expect during the application process, information about our rich benefits and perks along with our most frequently asked questions. If you are undecided and would like to learn more about us and how we are contributing to essential missions, check out our Two Six Technologies News page! We share information about the tech world around us and how we are making an impact! Still have questions, no worries! You can reach us at Contact Two Six Technologies. We are happy to connect and cover the information needed to assist you in reaching your next career milestone.
Responsibilities
• Direct the planning and execution of high-visibility, mission-critical programs, providing expert technical leadership and innovation in reverse engineering (RE) and vulnerability research (VR). • Tackle complex problems with no known solutions, demonstrating a high degree of creativity while mentoring a team of technical experts to foster growth and knowledge-sharing. • Author authoritative technical reports, white papers, and proposals that clearly convey research findings and cybersecurity solutions to both technical and business stakeholders. • Exert a leadership presence across the company, contributing to strategy development and ensuring customer satisfaction by delivering cutting-edge solutions aligned with national security requirements.
No credit card. Takes 10 seconds.