Senior Vulnerability Researcher

Posted 9 Days Ago
Be an Early Applicant
Gainesville, VA
1-3 Years Experience
Information Technology
The Role
As a Senior Vulnerability Researcher, you will perform vulnerability research, reverse engineering, and exploitation while mentoring junior staff. Responsibilities include identifying and exploiting vulnerabilities, developing proof-of-concept software, and collaborating with stakeholders to achieve operational goals.
Summary Generated by Built In

About the Organization

Now is a great time to join Redhorse Corporation. Redhorse specializes in developing and implementing creative strategies and solutions with private, state, and federal customers in the areas of cultural and environmental resources services, climate and energy change, information technology, and intelligence services. We are hiring creative, motivated, and talented people with a passion for doing what's right, what's smart, and what works.


Position Description

Redhorse's Cyber Analytics team is seeking a self-motivated Senior Vulnerability Researcher who is ready to solve some of the most challenging technical problems in a fast-paced environment supporting national security. Your role on our team will be to apply advanced vulnerability research (VR), reverse engineering (RE), and vulnerability exploitation (VE) skills to support a variety of defensive and offensive cyber requirements. As a senior member of our team, you will be expected to perform your work with minimal guidance and oversight and have the opportunity to mentor junior personnel.

Responsibilities:

  • Apply a variety of VR techniques like fuzzing, RE, online research, and other forms of experimentation to identify vulnerabilities and determine if they are exploitable
  • Apply knowledge and skills to develop proof-of-concept software to meet a variety of customer requirements
  • Manage customer expectations by implementing proactive feedback mechanisms
  • Prepare short presentations summarizing research findings
  • Collaborate with internal and external stakeholders
  • Shape CA requirements to meet operational goals
  • Synthesize creative solutions from technical and operational information
  • Identify, collaborate and communicate operational requirements
  • Perform vulnerability assessments of secure technologies to analyze whether protected or inaccessible information is recoverable

Minimum Basic Requirements for Skills, Experience, Education and Credentials:

  • Programming in contemporary Windows and Linux/Unix software development environments across multiple languages (C, C++, Java, JavaScript, etc)
  • Experience using tools such as IDA Pro, OllyDbg, and Windbg to reverse engineer Windows/Linux applications and OS kernel modules
  • Possess strong written/oral communications skills and interact with all levels of Government personnel.

Preferred Qualifications include:

  • Experience with network protocol analysis, static and dynamic malware analysis (iOS and Android) is preferred.
  • Knowledge of software engineering focusing on workflow automation of existing tools and products.
  • Proficiency in identifying discreet complex communications technologies that support investigative techniques.
  • Vulnerability Exploitation (VE) capabilities – understanding collaboration between vulnerability analysis concepts and computational resource requirements.
  • Education Requirement: Candidate must hold a Bachelor's of Science (B.S.) or Bachelor's of Arts (B.A.) degree in a technical discipline (for example: engineering, mathematics, or computer science).

Security Clerance:

  •  Active TS clearance required.

Equal Opportunity Employer/Veterans/Disabled 

 

Accommodations:

If you are a qualified individual with a disability or a disabled veteran, you may request a reasonable accommodation if you are unable or limited in your ability to access job openings or apply for a job on this site as a result of your disability. You can request reasonable accommodations by contacting Talent Acquisition at [email protected]

 

Redhorse Corporation shall, in its discretion, modify or adjust the position to meet Redhorse’s changing needs.

This job description is not a contract and may be adjusted as deemed appropriate in Redhorse’s sole discretion.

Top Skills

C
C++
Java
JavaScript
The Company
HQ: Arlington, VA
310 Employees
On-site Workplace
Year Founded: 2008

What We Do

We want to improve the way government interacts with and uses data and technology. Redhorse combines top-tier consulting experience with a passion for problem-solving to help clients address mission-critical government problems. We roll up our sleeves and stand shoulder-to-shoulder with our clients to understand their issues and find solutions, using digital transformation and artificial intelligence, partnered with our domain expertise in National Security, Networking Technology and Infrastructure, Energy and the Environment.

Jobs at Similar Companies

Silverfort Logo Silverfort

Sales Engineer- TOLA

Information Technology • Sales • Security • Cybersecurity • Automation
Remote
United States
357 Employees

InCommodities Logo InCommodities

Head of People & Culture - US

Information Technology • Machine Learning • Analytics • Energy • Automation • Renewable Energy
Hybrid
Austin, TX, USA
234 Employees

Similar Companies Hiring

Silverfort Thumbnail
Security • Sales • Information Technology • Cybersecurity • Automation
GB
357 Employees
Jobba Trade Technologies, Inc. Thumbnail
Software • Professional Services • Productivity • Information Technology • Cloud
Chicago, IL
45 Employees
InCommodities Thumbnail
Renewable Energy • Machine Learning • Information Technology • Energy • Automation • Analytics
Austin, TX
234 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account