Two Six Technologies is renowned for their innovative approach to solving complex global challenges. Their commitment to pushing boundaries and fostering collaboration makes them a leading force in the industry. As a company, they prioritize trust and empowerment, providing a supportive environment for their team to thrive.

About the Job
Two Six Technologies seeks a Lead Reverse Engineer & Vulnerability Researcher to join their team. The role demands technical expertise in program analysis, binary patching, and security vulnerability identification. The ideal candidate will navigate ambiguity with ease, taking initiative in a dynamic setting to drive impactful outcomes.

Responsibilities

  1. Tackle intricate technical problems with creativity and resourcefulness.
  2. Develop tools and techniques to streamline manual reverse engineering tasks.
  3. Conduct thorough reverse engineering on complex Linux-based applications.
  4. Provide technical leadership on multiple projects and engage directly with clients to convey findings.

Minimum Qualifications

  • Active TS/SCI clearance and eligibility for a polygraph.
  • 5+ years of programming experience in languages such as C, C++, Java, or Python, along with Linux proficiency.
  • Strong background in cybersecurity principles and experience in static analysis or software reverse engineering.
Also check  Apply for Healthcare Assistant at Nuffield Health Hereford Hospital

Preferred Qualifications

  • Client-facing technical experience.
  • Familiarity with reverse engineering toolsets like IDA or Ghidra.
  • Bachelor’s degree in computer science, engineering, or related fields.

Clearance Requirements Active TS/SCI clearance and polygraph eligibility.

Joining Two Six Technologies offers a unique opportunity to contribute to groundbreaking projects while receiving mentorship and support for professional growth. Candidates interested in making an impact in the field of cybersecurity will find an inspiring environment at Two Six Technologies.

APPLY HERE

8 COMMENTS

  1. This is a chance to be at the forefront of cybersecurity advancements and make a tangible impact in safeguarding digital ecosystems. Nice one

  2. Ah, I see Two Six is loading up the reverse engineering team again. For those unfamiliar, let me pull back the curtain on what this really means as someone who’s been through that meat grinder.
    Sure, it all sounds sexy on paper – poring through malicious code, uncovering vulnerabilities, beating hackers at their own game. The company pitches it as this elusive, highly-skilled role that only the sickest programmers and security ninjas need apply for.

    But in reality, it’s a resource furnace where you get burned out performing tedious, monotonous work analyzing the same crappy malware samples and crypto miners ad nauseam on the low-priority contracts. All for modest private sector pay while working ridiculous hours.

  3. As someone just starting out in computer science and cybersecurity, I have to admit the idea of working as a reverse engineer for a company like Two Six Technologies is pretty freakin’ awesome!

    Sure, I don’t have much direct experience actually reversing malware binaries or hunting vulnerabilities yet. But I’ve always been drawn to the intellectual challenge of taking something seemingly impenetrable and deconstructing it in creative ways to understand its essence.

  4. That’s basically the core of reverse engineering as I understand it, right? Using all the disassembly skills, static/dynamic analysis tricks, and other low-level wizardry to demystify obfuscated code and uncover what’s really going on under the hood.

  5. I know I’m still green and this role would be a major challenge. But that’s exactly why it could be such an amazing growth opportunity at the start of my career. Getting mentored by true pioneers in the field while getting paid to learn the most coveted skills? Yes please!

  6. I’m curious, though, about the company culture. How supportive are they really when it comes to professional growth?

  7. The job description mentions the need to “conduct thorough reverse engineering on complex Linux-based applications.” I’m wondering if anyone here has experience with this kind of work. What tools do you find most useful? How do you manage the challenge of navigating through such complex systems?

  8. This post brings up an interesting point about the importance of clearance in such a role. I’ve worked in similar positions before, and I can attest to the fact that the clearance process can be both time-consuming and stressful. For those considering applying, have you already gone through this process? If so, do you have any tips for managing the stress and uncertainty that comes with it?

LEAVE A REPLY

Please enter your comment!
Please enter your name here