Windows Reverse Engineer Vulnerability Researcher (TSSCI)

Redherd.io

Not Interested
Bookmark
Report This Job

profile Job Location:

Arlington County, VA - USA

profile Monthly Salary: Not Disclosed
Posted on: 3 hours ago
Vacancies: 1 Vacancy

Job Summary

Windows Reverse Engineer / Vulnerability Researcher (TS/SCI)

Location: Arlington Virginia (Onsite)
Clearance: Active TS/SCI required
Compensation: Up to $300000 total compensation

Overview

Our client is seeking a Windows Reverse Engineer / Vulnerability Researcher to conduct advanced research into the security of Windows operating systems and applications.

This role involves deep technical analysis of Windows internals reverse engineering of complex software and discovery of previously unknown vulnerabilities.

You will work with a highly skilled research team focused on understanding system behavior at the kernel and user-space levels identifying security weaknesses and developing proof-of-concept exploitation techniques.


Responsibilities

  • Perform reverse engineering and vulnerability research on Windows operating systems and software.
  • Conduct static and dynamic analysis of compiled binaries.
  • Analyze system behavior using debugging and instrumentation tools.
  • Research Windows internals including kernel components drivers and system services.
  • Identify and analyze memory corruption vulnerabilities and security flaws.
  • Develop proof-of-concept exploits to validate research findings.
  • Use debugging tools to trace and analyze complex system behavior.
  • Produce detailed technical documentation of research results.
  • Collaborate with other researchers to develop novel vulnerability discovery techniques.

Requirements

  • Active TS/SCI clearance.
  • Strong experience in reverse engineering and vulnerability research.
  • Deep understanding of Windows internals.
  • Experience with IDA Pro Ghidra Binary Ninja WinDbg or similar tools.
  • Strong knowledge of x86/x64 assembly.
  • Experience with debugging and dynamic analysis.
  • Programming experience with C/C.
  • Understanding of memory corruption vulnerabilities and exploitation techniques.

Nice to Have

  • Experience with kernel vulnerability research.
  • Experience with Windows driver development or analysis.
  • Experience developing exploits for Windows vulnerabilities.
  • Previous work in offensive security research environments.
  • Participation in CTFs or vulnerability research communities.
Windows Reverse Engineer / Vulnerability Researcher (TS/SCI)Location: Arlington Virginia (Onsite)Clearance: Active TS/SCI requiredCompensation: Up to $300000 total compensationOverviewOur client is seeking a Windows Reverse Engineer / Vulnerability Researcher to conduct advanced research into the se...
View more view more

Key Skills

  • Intelligence Community Experience
  • Python
  • Spss
  • Microsoft Word
  • R
  • Regression Analysis
  • Windows
  • Stata
  • Microsoft Powerpoint
  • Research Experience
  • Data Modeling
  • Writing Skills