Vulnerability Researcher

Found in: beBee jobs US - 2 weeks ago


San Antonio, Texas, United States Research Innovations Full time

Research Innovations, Inc. (RII) is breaking through the big, slow, status quo with transformative technology that fundamentally changes and improves the world. We develop cutting-edge software for all levels of the government and military. Using agile development practices and user-centered design, we create innovative software solutions for complex real-world problems.

We are seeking a dedicated Vulnerability Researcher to join our Cyber Security team. As a Vulnerability Researcher at RII, you will play a pivotal role in solving unique and challenging problems for our esteemed Defense and Homeland Security customers. This position requires a proactive mindset, deep technical expertise in vulnerability research, reverse engineering, and exploit mitigations/bypasses, and a drive to live one of our core values: Get s#t done.

This position requires an active US Secret security clearance.
WHAT YOU WILL BE DOING

Conducting in-depth reverse engineering and vulnerability analysis across various architectures and platforms, including x86/64, ARM, PowerPC, and more
Researching and analyzing operating system and application internals, identifying and understanding security strengths and weaknesses of those systems
Developing and enhancing functionality by adding features and capabilities to undocumented interfaces
Modeling and analyzing in-memory compiled application behavior to identify potential vulnerabilities and improve security measures
Developing and understanding mobile/embedded systems and kernel modules, particularly related to vulnerability research
Participating actively in our extensive Vulnerability Research mentorship program, sharing knowledge and collaborating with colleagues

WHAT YOU HAVE DONE
Proficient understanding of wireless networking and associated security protocols, such as Wi-Fi , Bluetooth, or cellular networks (2G/3G/4G/5G). Familiarity with common vulnerabilities and attack vectors in wireless communication
Strong grasp of legacy exploit mitigations and bypass techniques, including but not limited to Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP/NX), Stack Cookies (Canaries), and Control Flow Integrity (CFI). Experience in identifying and circumventing these security measures
In-depth knowledge of both security and network fundamentals, such as cryptography, authentication, access control, and network protocols (TCP/IP, UDP, DNS, HTTP, etc.). Understanding the security implications and potential vulnerabilities associated with these concepts
Programming experience with both scripted languages (preferably Python3) and compiled languages (preferably C). Ability to write efficient and secure code for vulnerability research and exploit development purposes
Familiarity with low-level architectures such as x86, ARM, or MIPS. Understanding the underlying principles, instruction sets, and memory models of these architectures for vulnerability identification and analysis
Experience with operating system internals and implementations, including Windows, Linux, or macOS. Knowledge of system structures, process management, memory management, and security mechanisms at the kernel level
Excellent oral, written, and interpersonal communication skills, with the ability to effectively convey complex technical concepts and interact with customers and team members alike

EVEN BETTER
Experience with vulnerability research and reverse engineering of real-time operating systems (RTOS), such as FreeRTOS, QNX, or VxWorks. Understanding the unique security challenges and attack vectors specific to RTOS environments
Bachelor's or postgraduate degree in Computer Science, Computer Engineering, or a related field
Experience with software protection and binary armoring techniques, such as anti-debugging, code obfuscation, or tamper resistance. Understanding the methods employed to protect software from reverse engineering and vulnerability discovery
Proficiency in agile development methodologies, including Scrum or Kanban, for efficient collaboration and iterative development in a cybersecurity context
Familiarity with low-level iOS/Android development and associated security considerations, such as jailbreaking or rooting, application sandboxing, or secure interprocess communication (IPC)
Knowledge of hypervisors and their security implications, including virtualization-based security, guest escape vulnerabilities, or hypervisor-based rootkits
Proficiency in malware analysis, including static and dynamic analysis techniques, behavioral analysis, and code deobfuscation. Experience in identifying and analyzing malware samples to understand their capabilities and potential vulnerabilities
Experience with constraint solving techniques, such as symbolic execution, theorem proving, or model checking, for vulnerability identification, verification, and exploit generation
Background in machine learning, particularly in the context of vulnerability analysis and detection, such as using ML techniques to identify patterns in code or analyze network traffic for anomaly detection

Research Innovations focuses on Deep Information Technology and Technology. Their company has offices in Alexandria. They have a mid-size team that's between employees.
You can view their website at or find them on LinkedIn.
  • Immigration Officer

    Found in: beBee jobs US - 6 days ago


    San Antonio, Texas, United States Department Of Homeland Security Full time

    Summary This position is located in Fraud Detection and National Security Directorate, Fraud Detection and National Security Division, District 31, FDNS San Antonio TX.As an Immigration Officer, you will provide guidance, conduct research for the purpose of enhancing current policies and procedures, and identify, articulate, and pursue suspected immigration...

  • NSA Employment – Network Manager

    Found in: beBee jobs US - 6 days ago


    San Antonio, Texas, United States National Security Agency Full time

    Job Description:NSA is in search of top-notch cyber professionals with technical expertise and driving desire at the forefront of their field. We have positions in penetration testing, defensive operations, identifying cyber threats and vulnerabilities and building defensive capabilities, designing, developing, deploying, sustaining and monitoring...

  • Research Specialist V

    Found in: Talent US 2 C2 - 6 days ago


    San Antonio, United States Texas Department of Aging & Disability Services Full time

    Job Description: Research Specialist V **This position will be headquartered in Regions 8 or 11 only. The Research Specialist V (RS-V) will be part of the Department of Family and Protective Services (DFPS) Office of Data and Systems Improvement (ODSI) and report to the APS Manager of Analytics for Change and Enhancement (ACE). ODSI works to build a...

  • Network Vulnerability Analyst with Security Clearance

    Found in: Dice One Red US C2 - 4 days ago


    san diego california, United States Zachary Piper Solutions, LLC Full time

    Zachary Piper Solutions is seeking a Network Vulnerability Analyst supporting the Research, Development, Test, and Evaluation (RDT&E) at the Naval Information Warfare Center (NIWC PAC) on-site in San Diego, CA. As a Network Vulnerability Analyst, you will work with a variety of subject matter experts covering the full breadth of cybersecurity and learn from...

  • Network Vulnerability Analyst with Security Clearance

    Found in: Careerbuilder One Red US C2 - 16 hours ago


    San Diego, CA, United States Zachary Piper Solutions, LLC Full time

    Zachary Piper Solutions is seeking a Network Vulnerability Analyst supporting the Research, Development, Test, and Evaluation (RDT&E) at the Naval Information Warfare Center (NIWC PAC) on-site in San Diego, CAAs a Network Vulnerability Analyst, you will work with a variety of subject matter experts covering the full breadth of cybersecurity and learn from...

  • *HYBRID* Network Vulnerability Analyst with Security Clearance

    Found in: Dice One Red US C2 - 2 days ago


    san diego california, United States Zachary Piper Solutions, LLC Full time

    Zachary Piper Solutions is seeking a Network Vulnerability Analyst for a position supporting a government contracting firm. The Network Vulnerability Analyst will be required to work on-site one day per week in Point Loma San Diego, CA. Theanalyst will identify, assess, and mitigate security vulnerabilities in network systems through scanning, testing, and...

  • *HYBRID* Network Vulnerability Analyst with Security Clearance

    Found in: Careerbuilder One Red US C2 - 17 hours ago


    San Diego, CA, United States Zachary Piper Solutions, LLC Full time

    Zachary Piper Solutions is seeking a Network Vulnerability Analyst for a position supporting a government contracting firm. The Network Vulnerability Analyst will be required to work on-site one day per week in Point Loma San Diego, CA. Theanalyst will identify, assess, and mitigate security vulnerabilities in network systems through scanning, testing, and...


  • San Francisco, United States University of San Francisco Full time

    **Postdoctoral Research Fellow in Advanced Artificial Intelligence for Equitable Safety of Vulnerable Road Users** **University of San Francisco** **R0009236** **101 Howard** **Job Title**: Postdoctoral Research Fellow in Advanced Artificial Intelligence for Equitable Safety of Vulnerable Road Users **Job Summary**: The University of San Francisco's Data...


  • San Antonio, United States Decision Point Security Inc. Full time

    Decision Point Security Inc. is currently seeking a dedicated and skilled Cybersecurity Test Engineer to join our growing team.As a cybersecurity test engineer you will be responsible for validating the security posture of customer applications and platforms through vulnerability research / analysis and penetration test. Your ability to think creatively...

  • ICC ISSO Specialist with Security Clearance

    Found in: Dice One Red US C2 - 6 days ago


    San Antonio, United States Dunhill Professional Search Full time

    Job Details ICC ISSO Specialist *Full-time Telework *Must be local to San Antonio, TX area *U.S. Citizenship Job Role: Creates cyber-intelligence tools / methods and performs research and analysis in order to mitigate and eliminate high level data and cyber security risks. Designs, tests and implements state-of-the-art secure operating systems, networks, and...

  • ISSO with Security Clearance

    Found in: Dice One Red US C2 - 6 days ago


    San Antonio, United States Dunhill Professional Search Full time

    Job Details ISSO *Full-time Telework *Must be local to San Antonio, TX area *U.S. Citizenship Required Job Role: Creates cyber-intelligence tools / methods and performs research and analysis in order to mitigate and eliminate high level data and cyber security risks. Designs, tests and implements state-of-the-art secure operating systems, networks, and...

  • ICC ISSO Specialist

    Found in: Appcast US C2 - 6 days ago


    San Antonio, United States Dunhill Professional Search Full time

    ICC ISSO Specialist*Full-time Telework*Must be local to San Antonio, TX area*U.S. CitizenshipJob Role:Creates cyber-intelligence tools / methods and performs research and analysis in order to mitigate and eliminate high level data and cyber security risks. Designs, tests and implements state-of-the-art secure operating systems, networks, and database...

  • ICC ISSO Specialist

    2 weeks ago


    San Antonio, United States Dunhill Professional Search Full time

    ICC ISSO Specialist*Full-time Telework*Must be local to San Antonio, TX area*U.S. CitizenshipJob Role:Creates cyber-intelligence tools / methods and performs research and analysis in order to mitigate and eliminate high level data and cyber security risks. Designs, tests and implements state-of-the-art secure operating systems, networks, and database...

  • ICC ISSO Specialist

    Found in: beBee S US - 2 weeks ago


    San Antonio, United States Dunhill Professional Search Full time

    ICC ISSO Specialist*Full-time Telework*Must be local to San Antonio, TX area*U.S. CitizenshipJob Role:Creates cyber-intelligence tools / methods and performs research and analysis in order to mitigate and eliminate high level data and cyber security risks. Designs, tests and implements state-of-the-art secure operating systems, networks, and database...

  • ICC ISSO Specialist

    7 days ago


    San Antonio, United States Dunhill Professional Search Full time

    ICC ISSO Specialist Full-time Telework Must be local to San Antonio, TX area U.S. CitizenshipJob Role:Creates cyber-intelligence tools / methods and performs research and analysis in order to mitigate and eliminate high level data and cyber security risks. Designs, tests and implements state-of-the-art secure operating systems, networks, and database...

  • ICC ISSO Specialist

    6 days ago


    San Antonio, United States Dunhill Professional Search Full time

    ICC ISSO Specialist*Full-time Telework*Must be local to San Antonio, TX area*U.S. CitizenshipJob Role:Creates cyber-intelligence tools / methods and performs research and analysis in order to mitigate and eliminate high level data and cyber security risks. Designs, tests and implements state-of-the-art secure operating systems, networks, and database...

  • ICC ISSO Specialist

    Found in: Appcast US C2 - 13 hours ago


    San Antonio, United States Dunhill Professional Search & Government Solutions Full time

    ICC ISSO Specialist*Full-time Telework*Must be local to San Antonio, TX area*U.S. CitizenshipJob Role:Creates cyber-intelligence tools / methods and performs research and analysis in order to mitigate and eliminate high level data and cyber security risks. Designs, tests and implements state-of-the-art secure operating systems, networks, and database...

  • ICC ISSO Specialist

    Found in: Appcast Linkedin GBL C2 - 2 weeks ago


    San Antonio, United States Dunhill Professional Search & Government Solutions Full time

    ICC ISSO Specialist*Full-time Telework*Must be local to San Antonio, TX area*U.S. CitizenshipJob Role:Creates cyber-intelligence tools / methods and performs research and analysis in order to mitigate and eliminate high level data and cyber security risks. Designs, tests and implements state-of-the-art secure operating systems, networks, and database...

  • Cardiology Research Associate I

    Found in: Talent US A C2 - 6 days ago


    San Diego, United States CEDARS-SINAI Full time

    Job DescriptionThe Clinical Research Associate I works directly with a Clinical Research Coordinator, Research Program Administrator, or Research Nurse to coordinate and/or implement the study.  Evaluates and abstracts research data and ensures compliance with protocol and research objectives.  Responsible for completing case report forms, entering...

  • Exploitation Analyst SME with Security Clearance

    Found in: Dice One Red US C2 - 6 days ago


    San Antonio, United States Markesman Group Full time

    Title Exploitation Analyst SME Location San Antonio Description Markesman Group is looking for an Exploitation Analyst SME to join our team in San Antonio, Texas. The Exploitation Analyst SME collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. They leverage all authorized resources...


  • San Antonio, United States CareerBuilder Full time

    We are a technology consulting firm that specializes in cloud native and enterprise DevSecOps transformations.We are passionate about technology and building value for our clients through amazing technical solutions usingcloud native, containers and extreme automation based DevSecOps practices. We believe in pushing the envelope and setting the bar high....


  • San Antonio, United States Oteemo Inc Full time

    We are a technology consulting firm that specializes in cloud native and enterprise DevSecOps transformations.We are passionate about technology and building value for our clients through amazing technical solutions usingcloud native, containers and extreme automation based DevSecOps practices. We believe in pushing the envelope and setting the bar high....