Two six technologies

Principal Mobile Vulnerability Researcher

Lorton, Virginia Full Time

At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future.

Overview of Opportunity 

Two Six Technologies is seeking a skilled Principal Mobile Vulnerability Researcher to join our team in northern Virginia. The successful candidate will work on identifying and exploiting vulnerabilities in firmware, applications, and hardware on mobile devices, collaborating with a dedicated team of developers, reverse engineers, and exploitation specialists. A deep passion for cybersecurity, problem-solving, and continuous learning is essential for this role.

Responsibilities:

  • Vulnerability Identification and Exploitation: Identify and exploit vulnerabilities such as memory corruption through stack overflows, heap overflows, integer overflows, and logical flaws.
  • Exploit Mitigation Bypass: Overcome mitigations like ASLR, code signing, non-executable memory protections, and sandboxing.
  • Technique Enhancement: Refine and combine exploitation techniques to assess severity.
  • Automation: Automate the identification of vulnerabilities, triggering mechanisms, and optimization of exploits.
  • Technical Leadership: Provide technical and functional direction, developing and implementing techniques to ensure customer satisfaction.

Minimum Qualifications:

  • Security Clearance: Active Top Secret Clearance.
  • Education: BS Degree in Computer Science or related technical fields.
  • Experience:
    • Proven experience in vulnerability research, reverse engineering, and exploit development on mobile platforms (iOS, Android) or their desktop counterparts (macOS, Linux).
    • Minimum of 7 years of experience in programming with languages such as C, C++, and Objective C.
    • Proficiency in at least one Assembly language (e.g., x86/64, ARM/64, MIPS).
    • Expertise in using disassemblers/decompilers and reverse engineering tools like IDA Pro, Ghidra, Hopper, or Binary Ninja.
    • Experience with modern scripting languages such as Python.
  • Knowledge: Strong understanding of operating systems, including the separation between kernel and user space.

Preferred Qualifications:

  • Wireless Communications: Knowledge of Bluetooth, Wi-Fi, or cellular internals and their interactions with mobile devices.
  • Client Interaction: Experience in a client-facing technical role.
  • Exploit Mitigations: Familiarity with methods to bypass exploit mitigations and detection techniques.
  • Cryptography: Basic understanding of cryptography design and implementation.
  • Fuzzing Solutions: Experience with creating and maintaining automated fuzzing solutions.
  • Crash Analysis: Expertise in analyzing crash reports for debugging or identifying vulnerabilities.

Clearance Requirements:

  • Active Top Secret Clearance.

#LI-ZS1

#LI-HYBRID

Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We believe in rewarding skills, experience, and performance. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development.

The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements.

Salary Range
$189,050$283,676 USD