← All Jobs
Posted Apr 16, 2026

Cleared Vulnerability Research Engineer

Apply Now
About the position This role is focused on end-to-end exploit development for real-world targets. The specialist will design, develop, and validate novel vulnerability discovery and exploitation capabilities against complex software and systems. Work is conducted at the operating system, binary, and micro-architectural levels, with a strong emphasis on creating new technical capabilities. Success in this position requires the ability to independently translate an under-defined mission objective into a concrete, technically novel capability and the comfort of operating with minimal supervision, incomplete problem definitions, and delayed feedback. Responsibilities • Design, develop, and validate novel vulnerability discovery and exploitation capabilities. • Conduct expert reverse engineering of binaries (x86-64, ARM64, etc.) using industry-standard tools. • Identify and exploit real-world vulnerabilities such as Use-after-free, Type confusion, Integer truncation, and Buffer overflow. • Demonstrate ability to discover new, novel vulnerabilities in complex systems. • Rapidly understand current vulnerability research and apply findings to identify new instances of vulnerability classes. • Employ both manual analysis and automated techniques (e.g., fuzzing) for vulnerability discovery. • Code and debug complex functions in C, Python, and Assembly (x86-64, ARM, etc.). • Independently manage and execute research objectives, including scoping, research, experimentation, validation, and iteration. • Travel to customer sites as required. • Perform on-site for extended periods of time. Requirements • Expertise in reverse engineering of binaries (x86-64, ARM64, etc) using tools such as Binary Ninja, Ghidra, or IDA Pro. • Precise understanding of stack and heap objects and exploit-relevant vulnerabilities (e.g., Use-after-free, Type confusion, Integer truncation, Buffer overflow). • Demonstrated ability to discover new vulnerabilities, not just exploit known ones. • Experience with both manual analysis and automated techniques (e.g., fuzzing). • Ability to code and debug C, Python, and Assembly (x86-64, ARM, etc). • Ability to independently translate an under defined mission objective into a concrete, technically novel capability. • Comfort operating with minimal supervision. • TS/SCI clearance required (inactive SCI acceptable if SCI-clearable). • Ability to travel to customer sites as required.
Interested in this role?Apply on iHire