Two Six Technologies
Jobs at Similar Companies
Similar Companies Hiring
Jobs at Two Six Technologies
Let Your Resume Do The Work
Upload your resume to be matched with jobs you're a great fit for.
Success! We'll use this to further personalize your experience.
Recently posted jobs
Information Technology • Security • Cybersecurity
The role involves aiding customers with application installation and troubleshooting, providing instruction, updating issue tracking, and collaborating with technical teams.
Information Technology • Security • Cybersecurity
The role involves reverse engineering embedded systems to analyze vulnerabilities, prototyping technologies, and conducting protocol analysis in collaboration with engineers on security solutions.
Information Technology • Security • Cybersecurity
As an Intel Analyst, you will drive analytical efforts, leveraging data to provide insights, develop visualizations, and guide improvement recommendations while mentoring junior analysts.
Information Technology • Security • Cybersecurity
Responsible for developing and maintaining automated tests, performing software testing, identifying defects, and collaborating with developers to resolve issues.
Information Technology • Security • Cybersecurity
Lead the vulnerability research for wireless and embedded systems, mentor a team, and interface with customers. Responsible for innovative research methodologies and driving team efficiency through tools and automation.
Information Technology • Security • Cybersecurity
Conduct reverse engineering and vulnerability research on embedded systems, analyze security vulnerabilities, develop proof of concept exploits, and collaborate to deliver solutions.
Information Technology • Security • Cybersecurity
As a Vulnerability Researcher, you will conduct reverse engineering, perform analyses to uncover vulnerabilities, and develop proof-of-concept capabilities.
Information Technology • Security • Cybersecurity
Responsible for transforming legacy Java systems to Golang microservices, developing telecommunications protocols, and optimizing databases for performance.
Information Technology • Security • Cybersecurity
The role involves analyzing systems, performing reverse engineering and vulnerability research, and creating proof-of-concept demonstrations while working with a technical team in cybersecurity.
Information Technology • Security • Cybersecurity
The Principal Software Engineer will lead AI-powered feature development, manage complex software projects, and drive the migration from Java to Go while coordinating with a remote team.
Information Technology • Security • Cybersecurity
As a Lead Hardware Reverse Engineer, you'll analyze embedded systems, conduct vulnerability research, draft reports, and prototype technologies to enhance system security.
Information Technology • Security • Cybersecurity
The DevOps Engineer will manage and automate deployments in AWS and Digital Ocean, ensuring system stability and security while collaborating with engineering teams. The role requires proficiency in various cloud and database technologies, CI/CD practices, and configuration management.
Information Technology • Security • Cybersecurity
Lead technical research tasks in reverse engineering while assessing vulnerabilities in firmware and software. Direct and manage a skilled team, collaborate on complex projects, and utilize advanced security analysis tools.
Information Technology • Security • Cybersecurity
As a Software Developer at Two Six Technologies, you will focus on web and desktop software, providing troubleshooting, support, and developing secure cloud-based applications.
Information Technology • Security • Cybersecurity
As a Front-End Developer, you will contribute to UI features for complex applications, requiring experience in JavaScript/TypeScript and modern web frameworks.
Information Technology • Security • Cybersecurity
Develop, test, and deploy web-based applications, provide maintenance and support, troubleshoot issues, and stay updated with industry trends.
Information Technology • Security • Cybersecurity
The Cloud DevOps Engineer will focus on security and delivering secure features, maintain cloud environments, and coordinate architectural designs.
Information Technology • Security • Cybersecurity
The Lead Hardware Reverse Engineer analyzes and reverse engineers embedded systems to identify vulnerabilities, prototyping solutions and conducting vulnerability research on complex architectures.
Information Technology • Security • Cybersecurity
Lead vulnerability research across hardware, software, and operational systems, mentor junior engineers, and develop countermeasures for security vulnerabilities.
Information Technology • Security • Cybersecurity
Conduct vulnerability research and reverse engineering on systems, develop proof of concept code, mentor junior staff, and analyze vulnerabilities' impact.


.png)



.png)