Experienced in performing in-depth reverse engineering and exploit development on applications and operating systems for mobile devices. Expertise in firmware reverse engineering, hardware reverse engineering, Linux/UNIX kernel development, and 4G/5G telecommunications research. Preference for applicants with a minimum of TS clearance and the ability to obtain SCI.
Two Six Technologies is seeking a Reverse Engineers & Vulnerability Researchers to perform in-depth reverse engineering and exploit development with the goal of transitioning those findings into capabilities. We are looking to hire a number of Security Researchers with experience in the following categories: firmware reverse engineering, hardware reverse engineering, and Linux/UNIX kernel development. Additional opportunities are available for embedded software engineers, RF electronic design engineers, FPGA/ASIC design engineers, hardware reverse engineers, firmware reverse engineers, and low-level developers looking to enter the security field. If you work in the embedded security domain, we would love to hear from you. Preference is for applicants who hold a TS clearance at the minimum with the ability to obtain SCI.