Vulnerability Research Engineer, Senior

The Challenge:

Are you looking for an opportunity to work in an R&D lab researching and analyzing security vulnerabilities associated with a wide variety of architectures for the Army? You possess an expert command of C/C++ programming and expertise in assembly language in one or more Instruction Set Architectures (ISA) and hardware platforms as well as reverse engineering tools, including Ida Pro and the use of fuzzing techniques and tools as well as the ability to comprehend dynamic, concrete, symbolic, and concolic software analysis.

As a software vulnerability researcher on our team, you’ll learn how to help customers overcome their most difficult challenges with a wide variety of architectures, including x86, MIPS, and ARM with an emphasis on embedded software applications and Real Time OS (RTOS). You’ll also have the opportunity to use open source frameworks and reverse engineering tools like Ida Pro. You’ll directly impact the DoD by conducting in depth assessments to find zero day vulnerabilities. With mentoring, positive reviews, and opportunities to learn new tools and skills, we focus on growing as a team to make the best solutions for our customers. The successful candidate will assume the lead research role in discovering vulnerabilities within identified applications in support of a research team. They will collaborate in identifying software patches and in the analysis for potential exploits which could have resulted from discovered vulnerabilities. Join us as we build systems to change the Army for the better.

Empower change with us.

You Have:

-Experience with software reverse engineering tools, including Ida Pro Hopper, x64, or Ghidra

-Experience with Radamsa, Libfuzzer, American Fuzzy LOP, Defensics Hongguzz, or OSS-fuzz

-Experience with C/C++

-Experience with debuggers, compilers, assemblers, linkers, source code extractors, and disassemblers for Windows, Linux, Android, Apple OS X, or IOS platforms

-Experience with emulation, including QEMU or code intermediate representation (IR)

-Knowledge of dynamic, concrete, symbolic, and concolic software analysis

-Knowledge of assembly languages

 -Top Secret clearance

-BA or BS degree 

Nice If You Have:

-Experience with cyber

-Experience with Electronic Warfare

-Knowledge of IP Protocols

-MA or MS degree preferred; PhD a plus


Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; Top Secret clearance is required.

We’re an EOE that empowers our people—no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, veteran status, or other protected characteristic—to fearlessly drive change.


Not ready to apply? Join our talent community and sign up for job alerts.