Lead Vulnerability Researcher

Two Six TechnologiesDayton, OH
1dHybrid

About The Position

At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future. Overview of Opportunity: Two Six Technologies is seeking a Lead Vulnerability Researcher to spearhead our vulnerability research initiatives in Dayton, Ohio. In this leadership role, you are more than a technical expert; you are a strategist and mentor who defines research methodologies and solves our most complex wireless and embedded system challenges. You will bridge the gap between high-level mission requirements and deep-dive technical execution. As a Lead, you will drive innovation within our Wireless Sector, ensuring our team remains at the forefront of the industry while serving as a primary technical point of contact for mission-critical government programs.

Requirements

  • Bachelor’s Degree in Electrical Engineering, Computer Engineering, Computer Science, or a related field.
  • Extensive experience in vulnerability research, reverse engineering, or CNO development.
  • Expert-level proficiency in modern decompilers (Ghidra, IDA Pro, or Binary Ninja).
  • Advanced knowledge of assembly languages (x86, ARM, MIPS, etc.) and OS internals.
  • Knowledge of common network protocols TCP/IP, UDP, or HTTP
  • Proficiency with at least one modern debugger such as GDB or WinDBG
  • Proven track record of discovering vulnerabilities in complex systems or developing sophisticated exploits.
  • Experience in a technical leadership or project lead capacity.
  • Security Clearance: Active US Secret-level clearance with the ability to obtain and maintain TS/SCI.

Nice To Haves

  • Experience assisting in technical writing for RFPs, white papers, or grant proposals to secure new research funding.
  • Mastery of defeating modern mitigations (ASLR, DEP, CFG) on non-standard architectures.
  • Deep knowledge of cellular standards (4G/5G) or low-bandwidth communications (CAN bus, RS485).
  • History of published research, conference presentations (DEF CON, Black Hat), or CVE credits.
  • Previous experience in a client-facing technical lead role for government contracts.

Responsibilities

  • Lead the execution of large-scale vulnerability research projects, ensuring high-quality results and innovative approaches.
  • Architect research strategies for complex, undocumented, or highly resilient embedded and wireless systems.
  • Grow the technical capabilities of the team by mentoring junior and staff researchers through code reviews and knowledge sharing.
  • Interface directly with customers to translate mission needs into technical requirements and present complex research findings.
  • Identify and implement new tools, automation, or methodologies (IR&D) to improve the team's research efficiency and capabilities.

Benefits

  • medical, dental, and vision insurance
  • life and disability insurance
  • retirement benefits
  • paid leave
  • tuition assistance
  • professional development
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service