Windows Reverse Engineer / Vulnerability Researcher (TS/SCI)
Location: Arlington Virginia (Onsite)
Clearance: Active TS/SCI required
Compensation: Up to $300000 total compensation
Overview
Our client is seeking a Windows Reverse Engineer / Vulnerability Researcher to conduct advanced research into the security of Windows operating systems and applications.
This role involves deep technical analysis of Windows internals reverse engineering of complex software and discovery of previously unknown vulnerabilities.
You will work with a highly skilled research team focused on understanding system behavior at the kernel and user-space levels identifying security weaknesses and developing proof-of-concept exploitation techniques.
Responsibilities
- Perform reverse engineering and vulnerability research on Windows operating systems and software.
- Conduct static and dynamic analysis of compiled binaries.
- Analyze system behavior using debugging and instrumentation tools.
- Research Windows internals including kernel components drivers and system services.
- Identify and analyze memory corruption vulnerabilities and security flaws.
- Develop proof-of-concept exploits to validate research findings.
- Use debugging tools to trace and analyze complex system behavior.
- Produce detailed technical documentation of research results.
- Collaborate with other researchers to develop novel vulnerability discovery techniques.
Requirements
- Active TS/SCI clearance.
- Strong experience in reverse engineering and vulnerability research.
- Deep understanding of Windows internals.
- Experience with IDA Pro Ghidra Binary Ninja WinDbg or similar tools.
- Strong knowledge of x86/x64 assembly.
- Experience with debugging and dynamic analysis.
- Programming experience with C/C.
- Understanding of memory corruption vulnerabilities and exploitation techniques.
Nice to Have
- Experience with kernel vulnerability research.
- Experience with Windows driver development or analysis.
- Experience developing exploits for Windows vulnerabilities.
- Previous work in offensive security research environments.
- Participation in CTFs or vulnerability research communities.
Windows Reverse Engineer / Vulnerability Researcher (TS/SCI)Location: Arlington Virginia (Onsite)Clearance: Active TS/SCI requiredCompensation: Up to $300000 total compensationOverviewOur client is seeking a Windows Reverse Engineer / Vulnerability Researcher to conduct advanced research into the se...
Windows Reverse Engineer / Vulnerability Researcher (TS/SCI)
Location: Arlington Virginia (Onsite)
Clearance: Active TS/SCI required
Compensation: Up to $300000 total compensation
Overview
Our client is seeking a Windows Reverse Engineer / Vulnerability Researcher to conduct advanced research into the security of Windows operating systems and applications.
This role involves deep technical analysis of Windows internals reverse engineering of complex software and discovery of previously unknown vulnerabilities.
You will work with a highly skilled research team focused on understanding system behavior at the kernel and user-space levels identifying security weaknesses and developing proof-of-concept exploitation techniques.
Responsibilities
- Perform reverse engineering and vulnerability research on Windows operating systems and software.
- Conduct static and dynamic analysis of compiled binaries.
- Analyze system behavior using debugging and instrumentation tools.
- Research Windows internals including kernel components drivers and system services.
- Identify and analyze memory corruption vulnerabilities and security flaws.
- Develop proof-of-concept exploits to validate research findings.
- Use debugging tools to trace and analyze complex system behavior.
- Produce detailed technical documentation of research results.
- Collaborate with other researchers to develop novel vulnerability discovery techniques.
Requirements
- Active TS/SCI clearance.
- Strong experience in reverse engineering and vulnerability research.
- Deep understanding of Windows internals.
- Experience with IDA Pro Ghidra Binary Ninja WinDbg or similar tools.
- Strong knowledge of x86/x64 assembly.
- Experience with debugging and dynamic analysis.
- Programming experience with C/C.
- Understanding of memory corruption vulnerabilities and exploitation techniques.
Nice to Have
- Experience with kernel vulnerability research.
- Experience with Windows driver development or analysis.
- Experience developing exploits for Windows vulnerabilities.
- Previous work in offensive security research environments.
- Participation in CTFs or vulnerability research communities.
View more
View less