Two six technologies

Vulnerability Researcher

Dayton, Ohio Full Time

At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future.

Overview of Opportunity:

Join the Trusted Electronics & Effects team at Two Six Technologies in Dayton, Ohio, where we push the boundaries of software and firmware reverse engineering to uncover vulnerabilities in wireless and embedded systems. As a Vulnerability Researcher, you will be a key technical contributor within our elite team of security researchers, CNO developers, and hardware engineers.

Our government customers rely on us to deliver mission-critical security solutions. We are looking for a researcher who is ready to take ownership of technical tasks, move beyond theory into high-impact discovery, and thrive in an environment focused on reverse engineering embedded systems and developing proof-of-concept exploits.

What You Will Do

  • Conduct targeted reverse engineering on a variety of embedded systems and software components.
  • Perform static and dynamic analysis to find security weaknesses under the guidance of senior technical leads.
  • Develop and refine proof-of-concept (PoC) capabilities to demonstrate research progress and the impact of discovered vulnerabilities.
  • Contribute to technical reports and documentation to further the team’s collective understanding of complex targets.
  • Work alongside cross-functional teams to integrate research findings into actionable customer solutions.

What You Will Need (Basic Qualifications)

  • Bachelor’s Degree in Electrical Engineering, Computer Engineering, Computer Science, or a related field.
  • 2–5 years of experience in cybersecurity research, vulnerability research, or reverse engineering.
  • Proficiency in at least one modern decompiler (Ghidra, IDA Pro, or Binary Ninja).
  • Proficiency with at least one modern debugger (GDB or WinDBG).
  • Proficiency in at least one native programming language (C or C++) and a scripting language (Python).
  • Knowledge of *nix operating systems and common network protocols (TCP/IP, UDP, HTTP).
  • Security Clearance: Active US Secret-level clearance with the ability to obtain and maintain TS/SCI.

Nice to Have (Preferred)

  • Experience with fuzzing frameworks (e.g., AFL++, LibFuzzer, or Boofuzz) to automate bug discovery.
  • Experience with hardware debugging interfaces like JTAG, SWD, or UART to extract firmware.
  • Familiarity with defeating modern protections like ASLR, DEP, and Stack Canaries.
  • Knowledge of WiFi, Bluetooth, or Zigbee communication standards.
  • Participation in CTFs or evidence of independent security research projects.

#LI-ZS1

#HYBRID

Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We believe in rewarding skills, experience, and performance. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development.

The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements.

Salary Range
$97,045$145,568 USD