Vulnerability Researcher
Confirmed live in the last 24 hours
Two Six Technologies

501-1,000 employees

Develops cybersecurity and data science solutions for global safety
Company Overview
Two Six Technologies is a leader in the tech industry, known for its commitment to solving complex global challenges through private R&D and technical expertise in various fields such as cyber, information operations, and data science. The company fosters a culture of collaboration and trust, enabling its team to create impactful products that enhance global safety and are trusted by high-profile customers like DARPA and U.S. Cyber Command. With a focus on rapid development and real-world application, Two Six Technologies offers a dynamic work environment for those passionate about making a significant difference on a global scale.
Data & Analytics
Cybersecurity
AI & Machine Learning
Aerospace

Company Stage

Series B

Total Funding

$40.2M

Founded

2021

Headquarters

Arlington, Virginia

Growth & Insights
Headcount

6 month growth

12%

1 year growth

35%

2 year growth

78%
Locations
Arlington, VA, USA
Experience Level
Entry
Junior
Mid
Senior
Expert
Desired Skills
TCP/IP
Python
CategoriesNew
IT & Security
Cybersecurity
IT Support
Requirements
  • Bachelor's Degree in Electrical Engineering, Computer Engineering, Computer Science, or related field
  • Knowledge of *nix operating systems
  • Knowledge of common network protocols TCP/IP, UDP, or HTTP
  • Proficiency with at least one modern debugger such as GDB or WinDBG
  • Proficiency in at least one modern decompiler such as Ghidra, IDA, or Binary Ninja
  • Proficiency in at least one native programming language such as C or C++
  • Proficiency in at least one scripting language such as Python
  • Proficiency in at least one assembly language such as x86 or ARM
  • Active US Security clearance of Top Secret level and ability to obtain and maintain TS/SCI
  • Must be willing to obtain and maintain a Polygraph clearance
Responsibilities
  • Conduct comprehensive reverse engineering on a variety of embedded systems
  • Perform static and dynamic analysis to find security vulnerabilities in embedded systems
  • Develop proof of concept capabilities to show research progress
  • Document research findings to further the team’s understanding of embedded systems
  • Collaborate with other disciplines to deliver solutions to our customers