Senior Vulnerability Researcher (Windows/CNE)
Мэтч & Сопровод
Для мэтча с этой вакансией нужен Plus
Описание вакансии
TL;DR
Senior Vulnerability Researcher (Windows/CNE): Leading advanced vulnerability research on Windows operating systems and core components to support CNE/CNO missions with an accent on reverse engineering and exploit development. Focus on discovering non-trivial vulnerabilities in modern mitigated Windows environments and developing proof-of-concept exploits.
Location: On-site in Arlington, VA
Salary: $60,000 – $180,000 USD
Company
is a Federal IT services provider specializing in digital transformation, cybersecurity, and software development for government agencies.
What you will do
- Lead advanced vulnerability research on Windows OS, kernel, and drivers.
- Analyze and reverse engineer complex vulnerabilities using IDA Pro, Ghidra, and Binary Ninja.
- Develop technical findings and PoCs to validate exploitation paths.
- Prototype novel discovery techniques for mitigated Windows platforms.
- Translate research into operational capabilities in collaboration with engineering teams.
- Serve as the senior SME for Windows internals and exploitation.
Requirements
- Active TS/SCI clearance is required.
- 3+ years of experience in vulnerability research or CNE-focused reverse engineering.
- Deep understanding of Windows internals including kernel architecture, memory management, and system calls.
- Proven track record of exploiting vulnerabilities in mitigated environments (ASLR, DEP, CFG).
- Proficiency in x86/x64 assembly, C/C++, and Python.
- Must be able to work on-site in Arlington, VA.
Culture & Benefits
- Competitive compensation package.
- Support for veterans and military spouses through the Virginia Values Veterans (V3) program.
- Opportunity to work on high-impact government contracts.
- Environment focused on providing sustainable change and improved performance for Federal Agencies.
Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →