Principal Cybersecurity Researcher
Confirmed live in the last 24 hours
Two Six Technologies

501-1,000 employees

Develops cybersecurity and data science solutions for global safety
Company Overview
Two Six Technologies is a leader in the tech industry, known for its commitment to solving complex global challenges through private R&D and technical expertise in various fields such as cyber, information operations, and data science. The company fosters a culture of collaboration and trust, enabling its team to create impactful products that enhance global safety and are trusted by high-profile customers like DARPA and U.S. Cyber Command. With a focus on rapid development and real-world application, Two Six Technologies offers a dynamic work environment for those passionate about making a significant difference on a global scale.
Data & Analytics
Cybersecurity
AI & Machine Learning
Aerospace

Company Stage

Series B

Total Funding

$40.2M

Founded

2021

Headquarters

Arlington, Virginia

Growth & Insights
Headcount

6 month growth

12%

1 year growth

35%

2 year growth

78%
Locations
Reston, VA, USA
Experience Level
Entry
Junior
Mid
Senior
Expert
Desired Skills
Python
CategoriesNew
IT & Security
Cybersecurity
IT Project Management
Requirements
  • Bachelor's degree in computer science, engineering, or related field
  • Minimum 9 years of experience in firmware development using low-level programming languages (C and at least one assembly language), scripting languages (e.g., Python), and the *nix command line
  • Minimum 5 years of experience with common disassemblers/decompilers and reverse engineering tools (IDA, Ghidra, Binary Ninja)
  • Active US Security clearance of Top Secret level and ability to obtain and maintain SCI
  • Must be willing to obtain and maintain a Polygraph clearance
Responsibilities
  • Collaborate with team to align capability development roadmaps and complete transfer of vulnerability research prototypes into production environments
  • Perform reverse engineering and vulnerability analysis, informing operational parameters for complex system
  • Conducting in-depth reverse engineering and vulnerability analysis across various architectures and platforms
  • Modeling and analyzing in-memory compiled application behavior to answer customer requirements
  • Assist with the forward development of technical solutions