Simplify Logo

Full-Time

Vulnerability Researcher

Cyber174

Posted on 1/5/2023

Research Innovations

Research Innovations

201-500 employees

Develops technology for national security solutions

Government & Public Sector
Defense

Junior, Mid, Senior

San Antonio, TX, USA + 2 more

Category
AI & Machine Learning
Software Engineering
Required Skills
Agile
Python
iOS/Swift
Android Development
Requirements
  • Understanding of wireless networking and associated security protocols
  • Strong understanding of modern exploit mitigations and bypasses
  • Strong understanding of both security and network fundamentals and protocols
  • Programming experience with both scripted (preferably Python3) and compiled (preferably C) languages
  • Familiarity with one (or more) low level architecture (x86, ARM, etc)
  • Experience with operating system internals and implementations
  • Excellent oral, written and interpersonal skills, as well as the ability to effectively interact with customers
  • BS or Postgraduate degree in Engineering or Computer Science or related field
  • Experience with software protection and binary armoring
  • Agile development experience
  • Experience with low level iOS/Android development
  • Experience with Hypervisors
  • Malware analysis
  • Constraint solving experience
  • Machine learning experience
Responsibilities
  • Reverse engineering across many architectures and platforms, including x86/64, ARM, PowerPC, and others
  • Researching operating system and application internals and understanding security strengths and weaknesses of those systems
  • Developing on multiple platforms and adding functionality to undocumented interfaces
  • Modeling in-memory compiled application behavior
  • Understanding and developing mobile/embedded systems
  • Understanding and developing kernel modules
  • Participating in our extensive Vulnerability Research mentorship program

Research Innovations Inc. specializes in technology solutions for national security. The company develops and implements advanced security technologies tailored to the specific needs of government agencies, including military and intelligence organizations. Their approach combines the expertise of operational specialists with technologists to create effective solutions that enhance security measures. Unlike many competitors, RII focuses on strong partnerships with government entities, ensuring that their products are customized and relevant to current operational challenges. The goal of Research Innovations is to drive digital transformation in national security, contributing to the safety and security of the nation through innovative technology.

Company Stage

N/A

Total Funding

N/A

Headquarters

Alexandria, Virginia

Founded

2009

Growth & Insights
Headcount

6 month growth

9%

1 year growth

9%

2 year growth

9%
Simplify Jobs

Simplify's Take

What believers are saying

  • RII's consistent recognition as a Great Place to Work® for five consecutive years indicates a strong, positive workplace culture.
  • The $54M Air Force contract and rapid revenue growth highlight RII's financial stability and potential for continued expansion.
  • The launch of the PRIISM platform demonstrates RII's commitment to innovation and its ability to deliver cutting-edge solutions to complex national security challenges.

What critics are saying

  • RII's heavy reliance on government contracts could pose a risk if there are changes in government spending or priorities.
  • The specialized nature of RII's work may limit its market to a niche segment, potentially restricting growth opportunities.

What makes Research Innovations unique

  • RII's focus on national security technology and strong government partnerships sets it apart from competitors who may not have the same level of specialization or client relationships.
  • The PRIISM Decision Advantage Platform offers a unique combination of command and control capabilities, real-time collaboration, and data-centric security, which is not commonly found in other solutions.
  • RII's collaborative approach, combining operational specialists with technologists, allows for the creation of highly tailored and effective security solutions.
INACTIVE