Jobs
>
Herndon

    Vulnerability Researcher - Herndon, United States - Chameleon Consulting Group

    Chameleon Consulting Group
    Chameleon Consulting Group Herndon, United States

    1 day ago

    Chameleon Consulting Group background
    Description
    Company Overview
    CCG is a technology company focused on equipping customers with the capabilities and support to conduct intelligent and successful cyber operations. We do this by finding the most talented engineers and operators in the country, give them some of the most challenging problems facing the US government, and help them unleash their creativity and problem-solving skills. Excellence is our standard and mission success is our metric.

    Role As a member of the Security Research team, you will imagine weaknesses in multiple types of systems and then find, demonstrate/document, and exploit those weaknesses. You will be joining a team of mature and extremely competent Security Researchers to breakdown and fully understand how a host of different systems function. You will need to leverage extensive experience performing static and dynamic analysis and must be familiar with multiple classes of vulnerabilities. Additionally, you must be extremely comfortable communicating with team members, technical partners, and non-technical partners alike. The ideal candidate will be comfortable and confident operating at the early phases of a vulnerability research project and have the mettle to see the project through to multiple phases and iterations. Responsibilities
    • Perform vulnerability research and reverse engineering for customer tasks
    • Perform static and dynamic analysis by applying research tools such as disassemblers, debuggers, and fuzzers
    • Perform exploit development which leverage discovered vulnerabilities
    • Be able to communicate security research findings internally and, when and where it is appropriate, externally
    Minimum Qualifications
    • Must possess TS clearance
    • Bachelors degree in Computer Engineering, Computer Science, Software Engineering, or a related technical discipline. Degree requirement can be met with four years of hands on experience in a software engineer or similar full time position
    • 2+ year(s) of experience in software vulnerability research
    • Experience with Ghidra, Binary Ninja, IDA or other reverse engineering/disassembler tools
    • Experience working in Linux fundamentals (strong grasp of sockets, file descriptors, networking, iptables, file systems, kernel, etc.)
    • Ability to read and write C and assembly languages as needed (ARM, MIPS, x86_64) with minimal oversight or supervision
    • Strong programming fundamentals; particularly with networking, data structures, and data models
    • Understanding of exploitation techniques such as leveraging arbitrary read-write primitives, shellcoding, and return-oriented programming / jump-oriented programming
    Preferred Experience
    • OS and kernel reverse engineering
    • Understanding of fuzzers such as AFL++ or libfuzzer
    • Understanding of common exploit mitigation mechanisms such as SELinux, Seccomp, ASLR, and CFI.
    • Understanding of dynamic analysis with gdb/gdbserver and similar tools
    • Basic understanding of compiler tool chains
    • Understanding of emulation using Qemu or Unicorn for running code in a non-native environment
    • Experience identifying 0-days and vulnerabilities
    • Develop high quality and reliable code (C, Assembly, Python, and/or JavaScript)


  • Two Six Technologies Arlington, United States

    At Two Six Technologies, we build, deploy, and implement innovative products that solve the world's most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what's possible to empower our team and support our customers in buil ...


  • Kudu Dynamics, LLC Chantilly, VA, United States

    Vulnerability Researcher/Reverse Engineer Job Description Who We Are: Kudu Dynamics is a 100% employee-owned company, forged out of a decade of experience in computer network operations and staffed with talent who have built, overseen, and enhanced capabilities throughout the ent ...


  • AnaVation LLC Chantilly, United States Full time

    Be Challenged and Make a Difference · In a world of technology, people make the difference. We believe if we invest in great people, then great things will happen. At AnaVation, we provide unmatched value to our customers and employees through innovative solutions and an engagin ...


  • Cipher Tech Solutions Vienna, United States

    FUTURE NEED Location: Vienna, VA Description: The candidate will be working independently as a Vulnerability Researcher to identify flaws in software. The candidate must be familiar with the latest techniques in vulnerability research and demonstrate their ability to follow best ...


  • Cipher Tech Solutions Vienna, VA, United States

    FUTURE NEED Location: Vienna, VA Description: The candidate will be working independently as a Vulnerability Researcher to identify flaws in software · The candidate must be familiar with the latest techniques in vulnerability research and demonstrate their ability to follow best ...


  • Cipher Tech Solutions Vienna, United States

    Job Description · Job DescriptionFUTURE NEED · Location: Vienna, VA · Description: · The candidate will be working independently as a Vulnerability Researcher to identify flaws in software. The candidate must be familiar with the latest techniques in vulnerability research and d ...


  • Two Six Technologies Arlington, United States

    Overview of Opportunity · Two Six Technologies is seeking a Vulnerability Researcher with active Secret Clearance to join our team in Arlington, Virginia.You will use and build upon cutting-edge techniques and tools to perform reverse engineering, vulnerability research, and expl ...


  • Two Six Technologies Arlington, United States

    At Two Six Technologies, we build, deploy, and implement innovative products that solve the world's most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what's possible to empower our team and support our customers in buil ...


  • Two Six Technologies Arlington, United States

    Two Six Technologies is seeking an experienced Principal Vulnerability Researcher with expertise in RF or communications domains to support our programs at our Arlington, Virginia headquarters. The team is composed of intellectual individuals, passionate about cybersecurity resea ...


  • Two Six Technologies Arlington, United States

    Two Six Technologies is seeking a Lead Vulnerability Researcher to support our growing team in Arlington, Virginia. You will work with a range of clients supporting national security missions. You will become a trusted advisor while learning and performing valuable technical and ...


  • Two Six Technologies Arlington, United States

    Two Six Technologies is seeking a Senior Vulnerability Researcher with active Top Secret Clearance to join our team in Arlington, Virginia. The team is composed of intellectual individuals, passionate about cybersecurity research. The team is growing and looking for someone with ...


  • Two Six Technologies Arlington, VA, United States

    At Two Six Technologies, we build, deploy, and implement innovative products that solve the world's most complex challenges today · Through unrivaled collaboration and unwavering trust, we push the boundaries of what's possible to empower our team and support our customers in bui ...


  • Two Six Technologies Arlington, United States

    Two Six Technologies is seeking aPrincipal Vulnerability Researcher with active Top Secret Clearance to join our team in Arlington, Virginia. The team is composed of intellectual individuals, passionate about cybersecurity research. The team is growing and looking for someone wit ...


  • Core One Washington, DC, United States

    Reverse Engineer and Vulnerability Researcher Join our team at Core One Our mission is to be at the forefront of devising analytical, operational, and technical solutions to our Nation's most complex national security challenges · In order to achieve our mission, Core One values ...


  • Two Six Technologies Arlington, United States

    Two Six Technologies is seeking a Lead Vulnerability Researcher with active Top Secret Clearance to join our team in Arlington, Virginia. You will become a trusted advisor in the National Security space while learning and performing valuable technical and industry skills. · Job R ...


  • ISI Enterprises Herndon, United States

    **Duties/Responsibilities**: · - Compliance and Risk Management: Ensure internal and client compliance with NIST SP , CMMC, and DFARS requirements. Conduct regular risk assessments and audits to identify and mitigate vulnerabilities. · - Continuous Cybersecurity Monitoring and An ...

  • Bluehawk, LLC

    Scs Analyst Expert

    1 week ago


    Bluehawk, LLC Reston, United States

    Overview: · **BLUEHAWK, LLC** is a professional services firm providing intelligence, information technology, language, and training services to the U.S. Government and commercial entities with objectives to protect and defend our nation, citizens, natural resources, critical inf ...

  • Bluehawk, LLC

    Scs Analyst

    1 week ago


    Bluehawk, LLC Reston, United States

    Overview: · **BLUEHAWK, LLC** is a professional services firm providing intelligence, information technology, language, and training services to the U.S. Government and commercial entities with objectives to protect and defend our nation, citizens, natural resources, critical Inf ...


  • Volmatica Inc Reston, United States

    **Job Title: Information System Security Officer** · **Location: Reston, VA** · **Onsite position** · **Visa Status: USC, GC Only for this position** · **Responsibilities include**: · - Lead, conduct, develop, validate, and submit information system security plans, security test ...


  • US Office of the Director of National Intelligence Reston, United States

    **Duties**: · The Audit Division is responsible for providing independent and objective audits of the Intelligence Community and ODNI to promote economy, efficiency, and effectiveness of programs and operations, and to reduce fraud, waste, abuse, and mismanagement. Audits are con ...