Use left and right arrow keys to navigate
Provided by the employer
Verified Pay check_circle $55.28 per hour
Hours Full-time
Location Vienna, Virginia

About this job

pspan style="font-family: arial, helvetica, sans-serif; font-size: 10pt;"strongspan style="line-height: 107%;"Location: Vienna, VA/span/strong/span/p pspan style="font-family: arial, helvetica, sans-serif; font-size: 10pt;"strongspan style="line-height: 107%;"Description:/span/strong/span/p pspan style="font-size: 10pt; line-height: 107%; font-family: arial, helvetica, sans-serif;"The candidate will be working independently as a Vulnerability Researcher to identify flaws in software. The candidate must be familiar with the latest techniques in vulnerability research and demonstrate their ability to follow best practices. Individual must be extremely detail oriented when documenting their research./span/p pspan style="font-family: arial, helvetica, sans-serif; font-size: 10pt;"strongspan style="line-height: 107%;"Requirements: /span/strong/span/p ul li style="tab-stops: list .5in;"span style="font-family: arial, helvetica, sans-serif; font-size: 10pt; background-color: #ffff99;"strongspan style="line-height: 107%;"MUST be a US citizen/span/strong/span/li li style="tab-stops: list .5in;"span style="font-family: arial, helvetica, sans-serif; font-size: 10pt; background-color: #ffff99;"strongspan style="line-height: 107%;"Must hold a US government security clearance at the TS Level or higher at time of application/span/strong/span/li li style="tab-stops: list .5in;"span style="font-family: arial, helvetica, sans-serif; font-size: 10pt;"strongspan style="line-height: 107%;"span style="background-color: #ffff99;"Must hold a Bachelor's degree in Computer Science, Electrical/Computer Engineering, Math or Physics/span (or be within one year of completion, no exceptions to degree type)/span/strong/span/li li style="tab-stops: list .5in;"span style="font-family: arial, helvetica, sans-serif; font-size: 10pt;"strongspan style="background-color: #ffff99;"span style="line-height: 107%;"Must have 3 years of post graduation span style="line-height: 107%; background-color: #ffff99;"experience relevant to this position./span/span/span/strong/span/li li style="tab-stops: list .5in;"span style="font-size: 10pt; line-height: 107%; font-family: arial, helvetica, sans-serif;"Strong C, ASM, and Python development experience/span/li li style="tab-stops: list .5in;"span style="font-size: 10pt; line-height: 107%; font-family: arial, helvetica, sans-serif;"Reverse engineering utilizing any of IDA, Ghidra, or Binary Ninja/span/li li style="tab-stops: list .5in;"span style="font-size: 10pt; line-height: 107%; font-family: arial, helvetica, sans-serif;"Experience with dynamic and static binary analysis amp; fuzzing techniques/span/li li style="tab-stops: list .5in;"span style="font-size: 10pt; line-height: 107%; font-family: arial, helvetica, sans-serif;"Extensive experience with debuggers (GDB, ADB, etc.)/span/li li style="tab-stops: list .5in;"span style="font-size: 10pt; line-height: 107%; font-family: arial, helvetica, sans-serif;"Experience auditing code for security vulnerabilities./span/li li style="tab-stops: list .5in;"span style="font-size: 10pt; line-height: 107%; font-family: arial, helvetica, sans-serif;"Demonstrated ability to self-drive research tasking/span/li li style="tab-stops: list .5in;"span style="font-size: 10pt; line-height: 107%; font-family: arial, helvetica, sans-serif;"Motivated to learn complex systems /span/li /ul pspan style="font-family: arial, helvetica, sans-serif; font-size: 10pt;"strongspan style="line-height: 107%;"Desired Skills:/span/strong/span/p ul li style="tab-stops: list .5in;"span style="font-size: 10pt; line-height: 107%; font-family: arial, helvetica, sans-serif;"Performing full system emulation for research and analysis/span/li li style="tab-stops: list .5in;"span style="font-size: 10pt; line-height: 107%; font-family: arial, helvetica, sans-serif;"Understanding of network protocols/span/li li style="tab-stops: list .5in;"span style="font-size: 10pt; line-height: 107%; font-family: arial, helvetica, sans-serif;"Experience reading and writing assembly (ARM, x86/x64)/span/li li style="tab-stops: list .5in;"span style="font-size: 10pt; line-height: 107%; font-family: arial, helvetica, sans-serif;"Understanding of OS Internals (any major OS)/span/li /ul pspan style="font-size: 10pt; line-height: 107%; font-family: arial, helvetica, sans-serif; background-color: #ccffff;"Remote work is not an option. We do offer relocation assistance. Please see our careers page or inquire with your recruiter about the terms and conditions. /span/p pspan style="font-family: arial, helvetica, sans-serif; font-size: 10pt;"stronguspan style="line-height: 107%;"Salary and other Compensation:/span/u/strong/span/p pspan style="font-size: 10pt; line-height: 107%; font-family: arial, helvetica, sans-serif;"The hourly wage range is: $55.28 - $81.73/span/p pspan style="font-size: 10pt; line-height: 107%; font-family: arial, helvetica, sans-serif;"The salary range for this position is subject not only to the hire's skills, education, expertise, and years of experience, but also to features of the final position offered to the hire: including, but not limited to the location of the position, clearance required for the position, and the contract associated with the position. See our Perks amp; Benefits page for a general description of benefits and other potential compensation benefits: https://www.ciphertechsolutions.com/careers/perks-benefits//span/p pspan style="font-family: arial, helvetica, sans-serif; font-size: 10pt;"stronguspan style="line-height: 107%;"About Us:/span/u/strong/span/p pspan style="font-size: 10pt; line-height: 107%; font-family: arial, helvetica, sans-serif;"At Cipher Tech Solutions, Inc. (Cipher Tech), we take great pride in supporting some of the most mission critical work in the Department of Defense and the Intelligence Community. The majority of our company is comprised of extremely talented software developers who write production tools which directly support one of two missions: digital forensics and malware reverse engineering./span/p pspan style="font-size: 10pt; line-height: 107%; font-family: arial, helvetica, sans-serif;"Digital forensics is the practice of extracting and processing evidence from computers, phones, tablets, cameras, flash-drives, and just about any other form of digital media. The results of our work are then used to support federal and military law enforcement, counterintelligence, and counter terrorist activities./span/p pspan style="font-size: 10pt; line-height: 107%; font-family: arial, helvetica, sans-serif;"Malware reverse engineering is the practice of analyzing malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as:/span/p pspan style="font-family: arial, helvetica, sans-serif; font-size: 10pt;"strongspan style="line-height: 107%;"*/span/strongspan style="line-height: 107%;"How did it infect the victim's computer strong*/strongWhat kind of information it is seeking to steal strong*/strongHow is it communicating with the author (actor) strong*/strongWho that actor might be./span/span/p pspan style="font-family: arial, helvetica, sans-serif; font-size: 10pt;"strongspan style="line-height: 107%; color: #00b050;"Vaccination Notice:/span/strong/span/p pspan style="font-size: 10pt; line-height: 107%; font-family: arial, helvetica, sans-serif; color: #00b050;"Please be aware that you are applying for a position to work as a federal contractor. As such, Cipher Tech will require, and your employment will be subject to, such vaccinations as are required by federal, state, and local law requirements./span/p pspan style="font-family: arial, helvetica, sans-serif; font-size: 10pt;"strongspan style="line-height: 107%; color: #ee0000;"Important Security Clearance Information:/span/strong/span/p pspan style="font-size: 10pt; line-height: 107%; font-family: arial, helvetica, sans-serif; color: #ee0000;"Be aware that you are applying for a job that requires you already hold a U.S. government security clearance at time of application. /span/p pspan style="font-family: arial, helvetica, sans-serif; font-size: 10pt;"The U.S. government uwill not issue/u security clearances to recent users of illegal drugs. On your application to us, you must acknowledge that you have not engaged in any illegal drug use within the past twelve months (illegal drug use includes, but is not limited to, the use of illegal substances, the misuse of prescriptions, the misuse of over-the-counter substances, strongand the use of medical or recreational marijuana that may be deemed legal at the state level/strong but is still considered illegal by the federal government). NOTE: CIPHER TECH WILL NOT DISCRIMINATE AGAINST ANY QUALIFIED APPLICANTS WITH A DISABILITY, INCLUDING ILLEGAL DRUG USERS WHO HAVE RECENTLY SOUGHT PROFESSIONAL TREATMENT FOR A DRUG PROBLEM./span/p pspan style="font-family: arial, helvetica, sans-serif; font-size: 10pt;"--/span/p pspan style="font-family: arial, helvetica, sans-serif; font-size: 10pt; color: #339966;"Cipher Tech is an Equal Opportunity Employer. All hiring and employment decisions are made on the basis of business requirements, performance, and merit with no regard to race, color, religion, sexual orientation, gender, gender identity, national origin, or other protected status./span/p pspan style="font-family: arial, helvetica, sans-serif; font-size: 10pt;"strongAll qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity or national origin./strong/span/p

Nearby locations

Posting ID: 1239701024 Posted: 2026-03-06 Job Title: Vulnerability Researcher Applicant