Machine Learning Scientist III - Causal Inference & CLV Strategy
Austin, TX jobs
Expedia Technology teams partner with our Product teams to create innovative products, services, and tools to deliver high-quality experiences for travelers, partners, and our employees. A singular technology platform powered by data and machine learning provides secure, differentiated, and personalized experiences that drive loyalty and traveler satisfaction.
Who We Are:
Travel is a force for good. At Expedia Group (Expedia, Hotels.com, Vrbo, Travelocity, Orbitz, Wotif, and others), our mission is to power global travel for everyone, everywhere-because we know that travel strengthens connections, broadens horizons, and bridges divides.
Powered by more than 80+ terabytes of data and 20+ years of tech innovation, Expedia Group is one of the world's largest travel platforms. With unrivaled knowledge of the industry and advanced technology, we've built a marketplace that filters through millions of possibilities for travelers and partners worldwide.
About the Team:
The Marketplace Machine Learning Science team is launching a high-impact initiative focused on Customer Lifetime Value (CLV)-a key business metric that will shape long-term company performance and executive decision-making. As a Machine Learning Scientist III, you will lead efforts to build causal models and experimentation frameworks that optimize how we serve millions of travelers globally.
This is a high-visibility role with direct exposure to executive leadership and cross-functional teams across product, engineering, marketing, customer service, pricing, and more. You'll be joining a zero-to-one initiative with strong leadership support and urgency to deliver impact starting immediately.
Strategic Impact & Visibility:
This role offers a rare opportunity to shape how Expedia Group measures and optimizes long-term customer value. You'll be part of a newly formed team with zero existing members on CLV, giving you the chance to influence foundational modeling decisions and build scalable solutions from the ground up.
In this role, you will:
Lead the research and implementation of scalable machine learning and data science solutions end-to-end with engineering rigor
Apply causal inference techniques to understand drivers of customer lifetime value and measure the impact of business interventions (e.g., marketing, service, product features)
Design and execute robust experiments (e.g., A/B tests, quasi-experimental methods) to evaluate business strategies and validate model performance
Translate complex findings into actionable insights for both technical and non-technical stakeholders
Break down ambiguous business problems into structured, data-driven solutions
Stay informed on relevant ML and AI research, with support from Expedia's learning and development resources
Collaborate with other machine learning and data science teams to foster a strong data science culture across Expedia Group
Minimum Qualifications:
Advanced degree in Computer Science, Statistics, Operations Research, Econometrics, Economics, or a related quantitative field
Typically requires 4+ years of professional experience, though candidates with equivalent project or research experience are encouraged to apply
Strong hands-on experience in causal modeling and experimental design
Proven ability to analyze large, complex datasets and generate actionable insights
Pragmatic problem solver focused on scalable and effective methods
Ability to share ideas effectively with diverse technical and business audiences
Preferred Qualifications:
Proficiency in Python; familiarity with Spark is a plus but not required - eagerness to learn is valued
Experience with end-to-end ML solution development
Experience or interest in applying AI techniques, including large language models (LLMs), is a plus
Postdoctoral Fellow, AI Driven Precision Oncology
Austin, TX jobs
General Notes
This is a grant funded position with an end date 1 year from the start date. The position is renewable based upon availability of funding, work performance, and progress toward goals with the option to continue until August 31, 2029, if renewed. Note: This candidate must be authorized to work in the United Stated without sponsorship.
Purpose
The Kowalski Lab at the University of Texas at Austin invites applications for a Postdoctoral Fellow position focused on developing advanced, AI-enabled methods for clinical decision support in precision oncology. The fellow will work at the intersection of computational innovation, translational science, and patient-centered care, contributing to pioneering efforts in integrating multi-modal data for individualized cancer therapy selection.
The lab leads multi-institutional projects combining clinical, molecular, proteomic, and other published data to build explainable and scalable decision-support systems. These systems are designed to bridge gaps in personalized treatment for patients with rare, resistant, or genomically un-targetable cancers.
Responsibilities
Design and evaluate algorithms for treatment and response matching using integrated clinical and molecular datasets.
Develop knowledge graphs and multimodal embeddings for cancer patient digital twin construction.
Lead and co-author high-impact publications and grant proposals.
Collaborate with clinicians, bioinformaticians, and data scientists across UT Austin, and other partners.
Mentor graduate and undergraduate research assistants and contribute to lab leadership.
Learning Opportunities:
Develop and deploy innovative AI models for treatment discovery and patient-specific decision support.
Gain experience in translational research across clinical, academic, and technology domains.
Participate in lab initiatives aligned with NCI, CPRIT, and NIH-funded projects.
Required Qualifications
PhD in computational biology, bioinformatics, computer science, information science, biomedical engineering, or a related field. PhD must have been received within the last three years, 1 year of experience with machine learning, natural language processing, AI tools and frameworks, data integration, and/or explainable AI. Proficiency in Python and R for use in data science and modeling. Excellent writing and communication skills; demonstrated publication record.
Preferred Qualifications
Knowledge of cancer biology, clinical oncology workflows, or multi-omics data.
Salary Range
$62,232+ depending on NIH level
Working Conditions
Standard office equipment
Repetitive use of a keyboard
Required Materials
Resume/CV
3 work references with their contact information; at least one reference should be from a supervisor
Letter of interest
Important for applicants who are NOT current university employees or contingent workers: You will be prompted to submit your resume the first time you apply, then you will be provided an option to upload a new Resume for subsequent applications. Any additional Required Materials (letter of interest, references, etc.) will be uploaded in the Application Questions section; you will be able to multi-select additional files. Before submitting your online job application, ensure that ALL Required Materials have been uploaded. Once your job application has been submitted, you cannot make changes.
Important for Current university employees and contingent workers: As a current university employee or contingent worker, you MUST apply within Workday by searching for Find UT Jobs. If you are a current University employee, log-in to Workday, navigate to your Worker Profile, click the Career link in the left hand navigation menu and then update the sections in your Professional Profile before you apply. This information will be pulled in to your application. The application is one page and you will be prompted to upload your resume. In addition, you must respond to the application questions presented to upload any additional Required Materials (letter of interest, references, etc.) that were noted above.
MA - Researcher
San Jose, CA jobs
The Media Analytics team at NEC Labs America is seeking outstanding researchers with a background in computer vision. Candidates must possess an exceptional track record of original research and passion to create high impact products. Our research areas include autonomous driving, embodied AI, multimodal LLM agents, vision-language models, neural rendering and open-world perception and planning. We have a strong internship program and active collaborations with academia. The Media Analytics team publishes extensively at top-tier venues such as CVPR, ICCV or ECCV. To check out our latest work, please visit: **************************************************
MA - Researcher
San Jose, CA jobs
The Media Analytics team at NEC Labs America is seeking outstanding researchers with a background in computer vision. Candidates must possess an exceptional track record of original research and passion to create high impact products. Our research areas include autonomous driving, embodied AI, multimodal LLM agents, vision-language models, neural rendering and open-world perception and planning.
We have a strong internship program and active collaborations with academia.
The Media Analytics team publishes extensively at top-tier venues such as CVPR, ICCV or ECCV.
To check out our latest work, please visit: ************
nec-labs.
com/research/media-analytics/
ML - Researcher
Princeton, NJ jobs
The Machine Learning Department, NEC Laboratories America has openings for researchers with a passion for developing the next generation of machine intelligence. Expertise in machine learning with a proven track record of original research are prerequisites for this position.
The Machine Learning Department has been at the forefront of research in such areas as deep learning, statistical learning, and machine reasoning for almost two decades. The research in our department has been published in premier venues and has won numerous awards, including the 2010 IEEE Neural Networks Pioneer Award, the 2012 IEEE Frank Rosenblatt Award, the 2012 Benjamin Franklin Medal, the 2013 NEC C&C Prize, ICML 2018 Test of Time Award, and NeurIPS 2018 Test of Time Award. Our recent work has been published at NeurIPS, ICML, ICLR, CVPR, KDD, ACL, RECOMB, Nature, Nature Genetics, Nature Machine Intelligence, and other top venues, and has garnered media coverage (Science News, Nature News, New York Times, MIT Technology Review).
A lot of our research has been translated into NEC's businesses, leading to innovative products and services of NEC, such as semantic analysis of job applications and product reviews, accident prevention, anomaly detection, and digital pathology.
Currently our department is tackling challenges in imparting abstract reasoning capabilities to machine learning and facilitating effective human-machine collaboration, and how these enable new applications in sustainable environment, smart manufacturing, safe cities, natural language processing, and personalized healthcare.
********************************************************
DSSS - Researcher
Princeton, NJ jobs
The Data Science team is dedicated to developing innovative, big data and AI solutions that simplify the management of complex systems. We focus on advancing AI services to enable cutting-edge applications, ranging from big data analytics to the Internet of Things. Our research combines both experimental and theoretical approaches, spanning diverse domains in data science and AI, including large language models (LLMs) and foundation models, time series analysis, graph mining, and more. The goal of our research is to thoroughly understand the dynamics of big data from complex systems and create groundbreaking solutions to help end user managing those systems. We have developed a suite of analytic engines and system solutions that efficiently process and analyze big data, supporting applications in detection, prediction, and optimization. Our research leads to both award-winning NEC products and publications in top conferences.
Our group is seeking researchers with expertise in AI and data-driven analytics. Ideal candidates should have a strong background in developing scalable algorithms and designing innovative AI applications that leverage emerging technologies to address real-world challenges.
ML - Researcher
Princeton, NJ jobs
The Machine Learning Department, NEC Laboratories America has openings for researchers with a passion for developing the next generation of machine intelligence. Expertise in machine learning with a proven track record of original research are prerequisites for this position.
The Machine Learning Department has been at the forefront of research in such areas as deep learning, statistical learning, and machine reasoning for almost two decades. The research in our department has been published in premier venues and has won numerous awards, including the 2010 IEEE Neural Networks Pioneer Award, the 2012 IEEE Frank Rosenblatt Award, the 2012 Benjamin Franklin Medal, the 2013 NEC C&C Prize, ICML 2018 Test of Time Award, and NeurIPS 2018 Test of Time Award. Our recent work has been published at NeurIPS, ICML, ICLR, CVPR, KDD, ACL, RECOMB, Nature, Nature Genetics, Nature Machine Intelligence, and other top venues, and has garnered media coverage (Science News, Nature News, New York Times, MIT Technology Review).
A lot of our research has been translated into NEC's businesses, leading to innovative products and services of NEC, such as semantic analysis of job applications and product reviews, accident prevention, anomaly detection, and digital pathology.
Currently our department is tackling challenges in imparting abstract reasoning capabilities to machine learning and facilitating effective human-machine collaboration, and how these enable new applications in sustainable environment, smart manufacturing, safe cities, natural language processing, and personalized healthcare.
********************************************************
Vulnerability Researcher
Fort Meade, MD jobs
At Two Six Technologies, we build, deploy, and implement innovative products that solve the world's most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what's possible to empower our team and support our customers in building a safer global future.
Overview of Opportunity
Join the Exploitation Sector of Two Six Technologies-a team of dedicated hackers in Northern Virginia and Maryland-where you'll immerse yourself in reverse engineering and vulnerability research on a wide range of embedded systems, software, and operational processes. Working alongside reverse engineers and security researchers, you'll identify vulnerabilities, analyze attack vectors, and assess operational impacts on some of the most critical systems for our customers. Our fast-growing roster of government customers relies on us to deliver advanced security solutions, and we're looking for a Vulnerability Researcher to help us continue pushing boundaries. If you're passionate about vulnerability research which can make a tangible impact on national security, we want you on our team.
This role requires regular on-site support at the Laurel, Maryland customer site.
What you will do:
* Identify vulnerabilities and potential attacks across hardware, software, procedures, logistics, and physical security of systems
* Develop proof of concept (PoC) code for identified vulnerabilities
* Reverse-engineer targeted embedded systems to identify vulnerabilities
* Review source-code looking for risks and vulnerabilities
* Analyze the effects of vulnerabilities on mission outcomes and operational effectiveness
* Compare system attack techniques and propose operationally effective countermeasures
* Produce reports, briefings, and perspectives on actual and potential attacks
What you will need (Basic Qualifications):
* Bachelor's degree and 2 years of relevant experience, OR Associate's degree and 4 years of relevant experience
* Relevant experience: computer/information systems design/development, programming, information/cyber/network security, reverse-engineering, vulnerability analysis, penetration testing, computer forensics, information assurance, or systems engineering
* Proficiency in C/C++, Python, and at least one ISA (e.g. x86/ARM/MIPS)
* Proficiency in linux command-line environments
* Experience using a decompiler such as IDA Pro, Binary Ninja, or Ghidra
* Experience using vulnerability research tools such as emulators or fuzzers
* Experience using a software debugger such as GDB or WinDbg
Nice If You Have (Preferred):
* Experience producing technical briefings for operational stakeholders
* Experience using a hardware debugger
* Experience with UART, SPI, I2C
* Experience with common secure communications such as TLS or SSH
* Familiarity with embedded firmware, RTOS, or networked systems
* Familiarity with high-side environments
Security Clearance:
* Active TS/SCI clearance with Polygraph required
#LI-ZS1
#LI-ONSITE
Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We believe in rewarding skills, experience, and performance. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development.
The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements.
Salary Range
$122,422-$183,633 USD
Looking for other great opportunities? Check out Two Six Technologies Opportunities for all our Company's current openings!
Ready to make the first move towards growing your career? If so, check out the Two Six Technologies Candidate Journey! This will give you step-by-step directions on applying, what to expect during the application process, information about our rich benefits and perks along with our most frequently asked questions. If you are undecided and would like to learn more about us and how we are contributing to essential missions, check out our Two Six Technologies News page! We share information about the tech world around us and how we are making an impact! Still have questions, no worries! You can reach us at Contact Two Six Technologies. We are happy to connect and cover the information needed to assist you in reaching your next career milestone.
Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law.
If you are an individual with a disability and would like to request reasonable workplace accommodation for any part of our employment process, please send an email to accommodations@twosixtech.com. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.
Additionally, please be advised that this business uses E-Verify in its hiring practices.
By submitting the following application, I hereby certify that to the best of my knowledge, the information provided is true and accurate.
Auto-ApplyMachine Learning Researcher
San Francisco, CA jobs
We are an applied AI lab building end-to-end software agents.
We're building collaborative AI teammates that enable engineers to focus on more interesting problems and empower engineering teams to strive for more ambitious goals. Our team is small and talent-dense. Among our founding team, we have world-class competitive programmers, former founders, and leaders from companies at the cutting edge of AI including Cursor, Scale AI, Lunchclub, Modal, Google DeepMind, Waymo, and Nuro.
Building Devin is just the first step-our hardest challenges still lie ahead. If you're excited to solve some of the world's biggest problems and build AI that can reason, apply to join us.
Auto-ApplyDoD SkillBridge Vulnerability Researcher (Cyber199)
Melbourne, FL jobs
Research Innovations, Inc. (RII) is breaking through the big, slow, status quo with transformative technology that fundamentally changes and improves the world. We develop cutting-edge software for all levels of the government and military. Using agile development practices and user-centered design, we create innovative software solutions for complex real-world problems.
We are seeking a dedicated Vulnerability Research SkillBridge candidate to join our Cyber Security team. In a Vulnerability Research SkillBridge opportunity at RII, you will play a pivotal role in solving unique and challenging problems for our esteemed Defense and Homeland Security customers. This position requires a proactive mindset, deep technical expertise in vulnerability research, reverse engineering, and exploit mitigations/bypasses, and a drive to live one of our core values: Get s#!t done.
This position is specifically for members of the DoD who are transitioning back to civilian life and can take advantage of programs such as SkillBridge. RII has strong connections to the military community, and we understand the transition to civilian life can be stressful-we will help you navigate those challenges. We are an approved DoD partner, and we have supported the transition of several active duty members to civilian roles, many of whom have been offered and accepted full-time employment with RII at the completion of their Skillbridge. During and after, RII provides an industry-leading mentorship and training program to selected applicants, supporting challenging, real, mission-oriented problems.
This position requires an active US Secret security clearance.WHAT YOU WILL BE DOING
Conducting in-depth reverse engineering and vulnerability analysis across various architectures and platforms, including x86/64, ARM, PowerPC, and more
Researching and analyzing operating system and application internals, identifying and understanding security strengths and weaknesses of those systems
Developing and enhancing functionality by adding features and capabilities to undocumented interfaces
Modeling and analyzing in-memory compiled application behavior to identify potential vulnerabilities and improve security measures
Developing and understanding mobile/embedded systems and kernel modules, particularly related to vulnerability research
Participating actively in our extensive Vulnerability Research mentorship program, sharing knowledge and collaborating with colleagues
WHAT YOU HAVE DONE
Proficient understanding of wireless networking and associated security protocols, such as Wi-Fi (802.11), Bluetooth, or cellular networks (2G/3G/4G/5G). Familiarity with common vulnerabilities and attack vectors in wireless communication
Strong grasp of legacy exploit mitigations and bypass techniques, including but not limited to Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP/NX), Stack Cookies (Canaries), and Control Flow Integrity (CFI). Experience in identifying and circumventing these security measures
In-depth knowledge of both security and network fundamentals, such as cryptography, authentication, access control, and network protocols (TCP/IP, UDP, DNS, HTTP, etc.). Understanding the security implications and potential vulnerabilities associated with these concepts
Programming experience with both scripted languages (preferably Python3) and compiled languages (preferably C). Ability to write efficient and secure code for vulnerability research and exploit development purposes
Familiarity with low-level architectures such as x86, ARM, or MIPS. Understanding the underlying principles, instruction sets, and memory models of these architectures for vulnerability identification and analysis
Experience with operating system internals and implementations, including Windows, Linux, or mac OS. Knowledge of system structures, process management, memory management, and security mechanisms at the kernel level
Excellent oral, written, and interpersonal communication skills, with the ability to effectively convey complex technical concepts and interact with customers and team members alike
EVEN BETTER
Experience with vulnerability research and reverse engineering of real-time operating systems (RTOS), such as FreeRTOS, QNX, or VxWorks. Understanding the unique security challenges and attack vectors specific to RTOS environments
Bachelor's or postgraduate degree in Computer Science, Computer Engineering, or a related field
Experience with software protection and binary armoring techniques, such as anti-debugging, code obfuscation, or tamper resistance. Understanding the methods employed to protect software from reverse engineering and vulnerability discovery
Proficiency in agile development methodologies, including Scrum or Kanban, for efficient collaboration and iterative development in a cybersecurity context
Familiarity with low-level iOS/Android development and associated security considerations, such as jailbreaking or rooting, application sandboxing, or secure interprocess communication (IPC)
Knowledge of hypervisors and their security implications, including virtualization-based security, guest escape vulnerabilities, or hypervisor-based rootkits
Proficiency in malware analysis, including static and dynamic analysis techniques, behavioral analysis, and code deobfuscation. Experience in identifying and analyzing malware samples to understand their capabilities and potential vulnerabilities
Experience with constraint solving techniques, such as symbolic execution, theorem proving, or model checking, for vulnerability identification, verification, and exploit generation
Background in machine learning, particularly in the context of vulnerability analysis and detection, such as using ML techniques to identify patterns in code or analyze network traffic for anomaly detection
We work to help your intellectual passions and creativity thrive. It's one of our core values: Let your geek flag fly.
We also offer all employees comprehensive benefits including: flexible work schedules, health insurance coverage, paid time off, 401k with a company match, paid parental leave, access to wellness programs and much more. You get this all from day one, and all paid for by RII.
It's all part of another of our core values: Stay human. It's why our comfortable and colorful offices such as our headquarters, include a community game room, pantry, massage chair, and an escape room, among other amenities. It's why we have community ambassadors and regular community events.
Research Innovations, Inc. is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender, gender identity or expression, national origin, genetics, disability status, protected veteran status, age, or any other characteristic protected by state, federal or local law.
#LI-AC1
Auto-ApplyVulnerability Researcher I/II (Cyber253)
Melbourne, FL jobs
Research Innovations, Inc. (RII) is breaking through the big, slow, status quo with transformative technology that fundamentally changes and improves the world. We develop cutting-edge software for all levels of the government and military. Using agile development practices and user-centered design, we create innovative software solutions for complex real-world problems.
We are seeking a dedicated Vulnerability Researcher to join our Cyber Security team. As a Vulnerability Researcher at RII, you will play a pivotal role in solving unique and challenging problems for our esteemed Defense and Homeland Security customers. This position requires a proactive mindset, deep technical expertise in vulnerability research, reverse engineering, and exploit mitigations/bypasses, and a drive to live one of our core values: Get s#!t done.
This position requires the ability to obtain and maintain a Top Secret Clearance with SCI eligibility WHAT YOU WILL BE DOING
Conducting in-depth reverse engineering and vulnerability analysis across various architectures and platforms, including x86/64, ARM, PowerPC, and more
Researching and analyzing operating system and application internals, identifying and understanding security strengths and weaknesses of those systems
Developing and enhancing functionality by adding features and capabilities to undocumented interfaces
Modeling and analyzing in-memory compiled application behavior to identify potential vulnerabilities and improve security measures
Developing and understanding mobile/embedded systems and kernel modules, particularly related to vulnerability research
Participating actively in our extensive Vulnerability Research mentorship program, sharing knowledge and collaborating with colleagues
WHAT YOU HAVE DONE
Proficient understanding of wireless networking and associated security protocols, such as Wi-Fi (802.11), Bluetooth, or cellular networks (2G/3G/4G/5G). Familiarity with common vulnerabilities and attack vectors in wireless communication
Strong grasp of legacy exploit mitigations and bypass techniques, including but not limited to Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP/NX), Stack Cookies (Canaries), and Control Flow Integrity (CFI). Experience in identifying and circumventing these security measures
In-depth knowledge of both security and network fundamentals, such as cryptography, authentication, access control, and network protocols (TCP/IP, UDP, DNS, HTTP, etc.). Understanding the security implications and potential vulnerabilities associated with these concepts
Programming experience with both scripted languages (preferably Python3) and compiled languages (preferably C). Ability to write efficient and secure code for vulnerability research and exploit development purposes
Familiarity with low-level architectures such as x86, ARM, or MIPS. Understanding the underlying principles, instruction sets, and memory models of these architectures for vulnerability identification and analysis
Experience with operating system internals and implementations, including Windows, Linux, or mac OS. Knowledge of system structures, process management, memory management, and security mechanisms at the kernel level
Excellent oral, written, and interpersonal communication skills, with the ability to effectively convey complex technical concepts and interact with customers and team members alike
EVEN BETTER
Experience with vulnerability research and reverse engineering of real-time operating systems (RTOS), such as FreeRTOS, QNX, or VxWorks. Understanding the unique security challenges and attack vectors specific to RTOS environments
Bachelor's or postgraduate degree in Computer Science, Computer Engineering, or a related field
Experience with software protection and binary armoring techniques, such as anti-debugging, code obfuscation, or tamper resistance. Understanding the methods employed to protect software from reverse engineering and vulnerability discovery
Proficiency in agile development methodologies, including Scrum or Kanban, for efficient collaboration and iterative development in a cybersecurity context
Familiarity with low-level iOS/Android development and associated security considerations, such as jailbreaking or rooting, application sandboxing, or secure interprocess communication (IPC)
Knowledge of hypervisors and their security implications, including virtualization-based security, guest escape vulnerabilities, or hypervisor-based rootkits
Proficiency in malware analysis, including static and dynamic analysis techniques, behavioral analysis, and code deobfuscation. Experience in identifying and analyzing malware samples to understand their capabilities and potential vulnerabilities
Experience with constraint solving techniques, such as symbolic execution, theorem proving, or model checking, for vulnerability identification, verification, and exploit generation
Background in machine learning, particularly in the context of vulnerability analysis and detection, such as using ML techniques to identify patterns in code or analyze network traffic for anomaly detection
At RII, we believe that diversity in our workforce is critical to our success. We strive to hire great people from a wide variety of backgrounds, not just because it's the right thing to do, but because it makes us stronger. We work to help your intellectual passions and creativity thrive. It's one of our core values: Let your geek flag fly.
We also offer all employees comprehensive benefits including: flexible work schedules, health insurance coverage, paid time off, 401k with a company match, paid parental leave, access to wellness programs and much more. You get this all from day one, and all paid for by RII.
It's all part of another of our core values: Stay human. It's why our comfortable and colorful offices such as our headquarters, include a community game room, pantry, massage chair, and an escape room, among other amenities. It's why we have community ambassadors and regular community events.
Research Innovations, Inc. is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender, gender identity or expression, national origin, genetics, disability status, protected veteran status, age, or any other characteristic protected by state, federal or local law.
Auto-ApplyDoD SkillBridge Vulnerability Researcher (Cyber199)
Melbourne, FL jobs
Job DescriptionResearch Innovations, Inc. (RII) is breaking through the big, slow, status quo with transformative technology that fundamentally changes and improves the world. We develop cutting-edge software for all levels of the government and military. Using agile development practices and user-centered design, we create innovative software solutions for complex real-world problems.
We are seeking a dedicated Vulnerability Research SkillBridge candidate to join our Cyber Security team. In a Vulnerability Research SkillBridge opportunity at RII, you will play a pivotal role in solving unique and challenging problems for our esteemed Defense and Homeland Security customers. This position requires a proactive mindset, deep technical expertise in vulnerability research, reverse engineering, and exploit mitigations/bypasses, and a drive to live one of our core values: Get s#!t done.
This position is specifically for members of the DoD who are transitioning back to civilian life and can take advantage of programs such as SkillBridge. RII has strong connections to the military community, and we understand the transition to civilian life can be stressful-we will help you navigate those challenges. We are an approved DoD partner, and we have supported the transition of several active duty members to civilian roles, many of whom have been offered and accepted full-time employment with RII at the completion of their Skillbridge. During and after, RII provides an industry-leading mentorship and training program to selected applicants, supporting challenging, real, mission-oriented problems.
This position requires an active US Secret security clearance.WHAT YOU WILL BE DOING
Conducting in-depth reverse engineering and vulnerability analysis across various architectures and platforms, including x86/64, ARM, PowerPC, and more
Researching and analyzing operating system and application internals, identifying and understanding security strengths and weaknesses of those systems
Developing and enhancing functionality by adding features and capabilities to undocumented interfaces
Modeling and analyzing in-memory compiled application behavior to identify potential vulnerabilities and improve security measures
Developing and understanding mobile/embedded systems and kernel modules, particularly related to vulnerability research
Participating actively in our extensive Vulnerability Research mentorship program, sharing knowledge and collaborating with colleagues
WHAT YOU HAVE DONE
Proficient understanding of wireless networking and associated security protocols, such as Wi-Fi (802.11), Bluetooth, or cellular networks (2G/3G/4G/5G). Familiarity with common vulnerabilities and attack vectors in wireless communication
Strong grasp of legacy exploit mitigations and bypass techniques, including but not limited to Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP/NX), Stack Cookies (Canaries), and Control Flow Integrity (CFI). Experience in identifying and circumventing these security measures
In-depth knowledge of both security and network fundamentals, such as cryptography, authentication, access control, and network protocols (TCP/IP, UDP, DNS, HTTP, etc.). Understanding the security implications and potential vulnerabilities associated with these concepts
Programming experience with both scripted languages (preferably Python3) and compiled languages (preferably C). Ability to write efficient and secure code for vulnerability research and exploit development purposes
Familiarity with low-level architectures such as x86, ARM, or MIPS. Understanding the underlying principles, instruction sets, and memory models of these architectures for vulnerability identification and analysis
Experience with operating system internals and implementations, including Windows, Linux, or mac OS. Knowledge of system structures, process management, memory management, and security mechanisms at the kernel level
Excellent oral, written, and interpersonal communication skills, with the ability to effectively convey complex technical concepts and interact with customers and team members alike
EVEN BETTER
Experience with vulnerability research and reverse engineering of real-time operating systems (RTOS), such as FreeRTOS, QNX, or VxWorks. Understanding the unique security challenges and attack vectors specific to RTOS environments
Bachelor's or postgraduate degree in Computer Science, Computer Engineering, or a related field
Experience with software protection and binary armoring techniques, such as anti-debugging, code obfuscation, or tamper resistance. Understanding the methods employed to protect software from reverse engineering and vulnerability discovery
Proficiency in agile development methodologies, including Scrum or Kanban, for efficient collaboration and iterative development in a cybersecurity context
Familiarity with low-level iOS/Android development and associated security considerations, such as jailbreaking or rooting, application sandboxing, or secure interprocess communication (IPC)
Knowledge of hypervisors and their security implications, including virtualization-based security, guest escape vulnerabilities, or hypervisor-based rootkits
Proficiency in malware analysis, including static and dynamic analysis techniques, behavioral analysis, and code deobfuscation. Experience in identifying and analyzing malware samples to understand their capabilities and potential vulnerabilities
Experience with constraint solving techniques, such as symbolic execution, theorem proving, or model checking, for vulnerability identification, verification, and exploit generation
Background in machine learning, particularly in the context of vulnerability analysis and detection, such as using ML techniques to identify patterns in code or analyze network traffic for anomaly detection
We work to help your intellectual passions and creativity thrive. It's one of our core values: Let your geek flag fly.
We also offer all employees comprehensive benefits including: flexible work schedules, health insurance coverage, paid time off, 401k with a company match, paid parental leave, access to wellness programs and much more. You get this all from day one, and all paid for by RII.
It's all part of another of our core values: Stay human. It's why our comfortable and colorful offices such as our headquarters, include a community game room, pantry, massage chair, and an escape room, among other amenities. It's why we have community ambassadors and regular community events.
Research Innovations, Inc. is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender, gender identity or expression, national origin, genetics, disability status, protected veteran status, age, or any other characteristic protected by state, federal or local law.
#LI-AC1
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Vulnerability Researcher I/II (Cyber253)
Melbourne, FL jobs
Job DescriptionResearch Innovations, Inc. (RII) is breaking through the big, slow, status quo with transformative technology that fundamentally changes and improves the world. We develop cutting-edge software for all levels of the government and military. Using agile development practices and user-centered design, we create innovative software solutions for complex real-world problems.
We are seeking a dedicated Vulnerability Researcher to join our Cyber Security team. As a Vulnerability Researcher at RII, you will play a pivotal role in solving unique and challenging problems for our esteemed Defense and Homeland Security customers. This position requires a proactive mindset, deep technical expertise in vulnerability research, reverse engineering, and exploit mitigations/bypasses, and a drive to live one of our core values: Get s#!t done.
This position requires the ability to obtain and maintain a Top Secret Clearance with SCI eligibility WHAT YOU WILL BE DOING
Conducting in-depth reverse engineering and vulnerability analysis across various architectures and platforms, including x86/64, ARM, PowerPC, and more
Researching and analyzing operating system and application internals, identifying and understanding security strengths and weaknesses of those systems
Developing and enhancing functionality by adding features and capabilities to undocumented interfaces
Modeling and analyzing in-memory compiled application behavior to identify potential vulnerabilities and improve security measures
Developing and understanding mobile/embedded systems and kernel modules, particularly related to vulnerability research
Participating actively in our extensive Vulnerability Research mentorship program, sharing knowledge and collaborating with colleagues
WHAT YOU HAVE DONE
Proficient understanding of wireless networking and associated security protocols, such as Wi-Fi (802.11), Bluetooth, or cellular networks (2G/3G/4G/5G). Familiarity with common vulnerabilities and attack vectors in wireless communication
Strong grasp of legacy exploit mitigations and bypass techniques, including but not limited to Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP/NX), Stack Cookies (Canaries), and Control Flow Integrity (CFI). Experience in identifying and circumventing these security measures
In-depth knowledge of both security and network fundamentals, such as cryptography, authentication, access control, and network protocols (TCP/IP, UDP, DNS, HTTP, etc.). Understanding the security implications and potential vulnerabilities associated with these concepts
Programming experience with both scripted languages (preferably Python3) and compiled languages (preferably C). Ability to write efficient and secure code for vulnerability research and exploit development purposes
Familiarity with low-level architectures such as x86, ARM, or MIPS. Understanding the underlying principles, instruction sets, and memory models of these architectures for vulnerability identification and analysis
Experience with operating system internals and implementations, including Windows, Linux, or mac OS. Knowledge of system structures, process management, memory management, and security mechanisms at the kernel level
Excellent oral, written, and interpersonal communication skills, with the ability to effectively convey complex technical concepts and interact with customers and team members alike
EVEN BETTER
Experience with vulnerability research and reverse engineering of real-time operating systems (RTOS), such as FreeRTOS, QNX, or VxWorks. Understanding the unique security challenges and attack vectors specific to RTOS environments
Bachelor's or postgraduate degree in Computer Science, Computer Engineering, or a related field
Experience with software protection and binary armoring techniques, such as anti-debugging, code obfuscation, or tamper resistance. Understanding the methods employed to protect software from reverse engineering and vulnerability discovery
Proficiency in agile development methodologies, including Scrum or Kanban, for efficient collaboration and iterative development in a cybersecurity context
Familiarity with low-level iOS/Android development and associated security considerations, such as jailbreaking or rooting, application sandboxing, or secure interprocess communication (IPC)
Knowledge of hypervisors and their security implications, including virtualization-based security, guest escape vulnerabilities, or hypervisor-based rootkits
Proficiency in malware analysis, including static and dynamic analysis techniques, behavioral analysis, and code deobfuscation. Experience in identifying and analyzing malware samples to understand their capabilities and potential vulnerabilities
Experience with constraint solving techniques, such as symbolic execution, theorem proving, or model checking, for vulnerability identification, verification, and exploit generation
Background in machine learning, particularly in the context of vulnerability analysis and detection, such as using ML techniques to identify patterns in code or analyze network traffic for anomaly detection
At RII, we believe that diversity in our workforce is critical to our success. We strive to hire great people from a wide variety of backgrounds, not just because it's the right thing to do, but because it makes us stronger. We work to help your intellectual passions and creativity thrive. It's one of our core values: Let your geek flag fly.
We also offer all employees comprehensive benefits including: flexible work schedules, health insurance coverage, paid time off, 401k with a company match, paid parental leave, access to wellness programs and much more. You get this all from day one, and all paid for by RII.
It's all part of another of our core values: Stay human. It's why our comfortable and colorful offices such as our headquarters, include a community game room, pantry, massage chair, and an escape room, among other amenities. It's why we have community ambassadors and regular community events.
Research Innovations, Inc. is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender, gender identity or expression, national origin, genetics, disability status, protected veteran status, age, or any other characteristic protected by state, federal or local law.
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Tax Researcher
Carrollton, TX jobs
Established in 1991, Collabera has been a leader in IT staffing for over 22 years and is one of the largest diversity IT staffing firms in the industry. As a half a billion dollar IT company, with more than 9,000 professionals across 30+ offices, Collabera offers comprehensive, cost-effective IT staffing & IT Services. We provide services to Fortune 500 and mid-size companies to meet their talent needs with high quality IT resources through Staff Augmentation, Global Talent Management, Value Added Services through CLASS (Competency Leveraged Advanced Staffing & Solutions) Permanent Placement Services and Vendor Management Programs.
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance.
Job Description
Position Details:
Industry: Mass Media
Work Location: Carrollton, TX
Job Title: Legal Analyst
Duration: 3+ month
Summary:
• The Legal Analyst is responsible for the multi-state tax technical research for various products and services, which entails documentation of the states' laws regarding taxability of these items and maintaining all records to support our taxability position.
• This information will be used to update multiple tax data systems with sales, use, telecommunication, and other special tax rates and rules in U.S. jurisdictions.
• Review and analyze test cases for tax scenarios.
Job responsibilities include:
• Research, analyze, and document sales, use and other special tax rate and rule changes.
• Monitor statutes, legislative activity, and tax publications to stay abreast of changes in laws and regulations affecting sales and use tax.
• Enter tax data changes in multiple tax applications.
• Develop and analyze test cases for tax compliance.
• Correspond with state and local tax authorities.
• Research and write memos on complicated sales tax issues.
• Communicate and work with other internal teams to complete timely and correct tax data updates
• Conduct presentations on areas of content responsibility.
• Perform special projects as assigned by management.
Job and work experience requirements:
• Bachelor's degree in business administration, accounting, finance or related field.
• Law degree
• Ability to utilize online research tools (e.g. CCH, Lexis-Nexis, RIA)
Special skills and knowledge requirements:
• Ability to consistently meet rigid and recurring deadlines
• Ability to communicate effectively and handle multiple tasks.
• Knowledge of multi-state sales tax laws and requirements
• Ability to interact successfully with various tax authorities.
• Software systems: Microsoft Excel, Word, Outlook, Access
Additional Information
To schedule an interview,
please contact: Monil Narayan, ************
Vulnerability Researcher
Arlington, VA jobs
At Two Six Technologies, we build, deploy, and implement innovative products that solve the world's most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what's possible to empower our team and support our customers in building a safer global future.
Overview of Opportunity
Join the Exploitation Sector of Two Six Technologies-a team of dedicated hackers in Arlington, Virginia-where you'll immerse yourself in cutting-edge Vulnerability Research on a wide range of unique embedded systems. Working side by side with top-tier CNO developers and hardware engineers, you'll discover vulnerabilities and create proof of concepts on embedded systems. Our fast-growing roster of government customers relies on us to deliver advanced security solutions, and we're looking for a Vulnerability Researcher to help us continue pushing boundaries. If you're passionate about building tools that make a tangible impact on national security, we want you on our team.
What you will do:
Analyze and solve complex technical challenges with no predefined answers.
Perform in-depth reverse engineering to identify vulnerabilities, assess their impact, and transform findings into actionable capabilities.
Deconstruct and understand the functionality of intricate technical systems.
Navigate ambiguity and independently forge paths toward innovative solutions.
Collaborate in a small-team environment, where your contributions will have an outsized impact.
Leverage your expertise in digital forensics and watermarking to inform secure development practices and maintain data integrity throughout the product lifecycle.
What you will need (Basic Qualifications):
Bachelor's (or higher) degree in computer science, engineering, or a related field (solid knowledge in data structures and algorithms may substitute for a specific degree)
Experience with programming/scripting languages in C, Python and the *nix command line
Familiarity with reverse engineering principles and disassemblers (e.g., Binary Ninja, Ghidra, IDA)
Minimum of 3 years of experience utilizing cybersecurity principles and a strong interest in learning more
Active Top Secret clearance with eligibility/willingness to obtain a Top Secret/SCI clearance
Ability to work in the Arlington, Virginia office daily
Nice to have (Preferred):
Experience scripting with the Binary Ninja API or Ghidra.
Experience with other languages (e.g. Go, Rust)
Knowledge of embedded device security and reverse engineering (e.g., ARM, RTOS).
Familiarity with cryptography concepts and their implementation.
Hands-on experience working with hardware and embedded systems.
Prefer active TS/SCI with Poly
Security Clearance:
Active Top Secret clearance with eligibility/willingness to obtain a Top Secret/SCI clearance.
#LI-ZS1
#LI-ONSITE
Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We believe in rewarding skills, experience, and performance. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development.
The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements.
Salary Range$119,646-$179,469 USD
Looking for other great opportunities? Check out Two Six Technologies Opportunities for all our Company's current openings!
Ready to make the first move towards growing your career? If so, check out the Two Six Technologies Candidate Journey! This will give you step-by-step directions on applying, what to expect during the application process, information about our rich benefits and perks along with our most frequently asked questions. If you are undecided and would like to learn more about us and how we are contributing to essential missions, check out our Two Six Technologies News page! We share information about the tech world around us and how we are making an impact! Still have questions, no worries! You can reach us at Contact Two Six Technologies. We are happy to connect and cover the information needed to assist you in reaching your next career milestone.
Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law.
If you are an individual with a disability and would like to request reasonable workplace accommodation for any part of our employment process, please send an email to accommodations@twosixtech.com. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.
Additionally, please be advised that this business uses E-Verify in its hiring practices.
By submitting the following application, I hereby certify that to the best of my knowledge, the information provided is true and accurate.
Auto-ApplyDoD SkillBridge Vulnerability Researcher (Cyber199)
Saint Pete Beach, FL jobs
Research Innovations, Inc. (RII) is breaking through the big, slow, status quo with transformative technology that fundamentally changes and improves the world. We develop cutting-edge software for all levels of the government and military. Using agile development practices and user-centered design, we create innovative software solutions for complex real-world problems.
We are seeking a dedicated Vulnerability Research SkillBridge candidate to join our Cyber Security team. In a Vulnerability Research SkillBridge opportunity at RII, you will play a pivotal role in solving unique and challenging problems for our esteemed Defense and Homeland Security customers. This position requires a proactive mindset, deep technical expertise in vulnerability research, reverse engineering, and exploit mitigations/bypasses, and a drive to live one of our core values: Get s#!t done.
This position is specifically for members of the DoD who are transitioning back to civilian life and can take advantage of programs such as SkillBridge. RII has strong connections to the military community, and we understand the transition to civilian life can be stressful-we will help you navigate those challenges. We are an approved DoD partner, and we have supported the transition of several active duty members to civilian roles, many of whom have been offered and accepted full-time employment with RII at the completion of their Skillbridge. During and after, RII provides an industry-leading mentorship and training program to selected applicants, supporting challenging, real, mission-oriented problems.
This position requires an active US Secret security clearance.WHAT YOU WILL BE DOING
Conducting in-depth reverse engineering and vulnerability analysis across various architectures and platforms, including x86/64, ARM, PowerPC, and more
Researching and analyzing operating system and application internals, identifying and understanding security strengths and weaknesses of those systems
Developing and enhancing functionality by adding features and capabilities to undocumented interfaces
Modeling and analyzing in-memory compiled application behavior to identify potential vulnerabilities and improve security measures
Developing and understanding mobile/embedded systems and kernel modules, particularly related to vulnerability research
Participating actively in our extensive Vulnerability Research mentorship program, sharing knowledge and collaborating with colleagues
WHAT YOU HAVE DONE
Proficient understanding of wireless networking and associated security protocols, such as Wi-Fi (802.11), Bluetooth, or cellular networks (2G/3G/4G/5G). Familiarity with common vulnerabilities and attack vectors in wireless communication
Strong grasp of legacy exploit mitigations and bypass techniques, including but not limited to Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP/NX), Stack Cookies (Canaries), and Control Flow Integrity (CFI). Experience in identifying and circumventing these security measures
In-depth knowledge of both security and network fundamentals, such as cryptography, authentication, access control, and network protocols (TCP/IP, UDP, DNS, HTTP, etc.). Understanding the security implications and potential vulnerabilities associated with these concepts
Programming experience with both scripted languages (preferably Python3) and compiled languages (preferably C). Ability to write efficient and secure code for vulnerability research and exploit development purposes
Familiarity with low-level architectures such as x86, ARM, or MIPS. Understanding the underlying principles, instruction sets, and memory models of these architectures for vulnerability identification and analysis
Experience with operating system internals and implementations, including Windows, Linux, or mac OS. Knowledge of system structures, process management, memory management, and security mechanisms at the kernel level
Excellent oral, written, and interpersonal communication skills, with the ability to effectively convey complex technical concepts and interact with customers and team members alike
EVEN BETTER
Experience with vulnerability research and reverse engineering of real-time operating systems (RTOS), such as FreeRTOS, QNX, or VxWorks. Understanding the unique security challenges and attack vectors specific to RTOS environments
Bachelor's or postgraduate degree in Computer Science, Computer Engineering, or a related field
Experience with software protection and binary armoring techniques, such as anti-debugging, code obfuscation, or tamper resistance. Understanding the methods employed to protect software from reverse engineering and vulnerability discovery
Proficiency in agile development methodologies, including Scrum or Kanban, for efficient collaboration and iterative development in a cybersecurity context
Familiarity with low-level iOS/Android development and associated security considerations, such as jailbreaking or rooting, application sandboxing, or secure interprocess communication (IPC)
Knowledge of hypervisors and their security implications, including virtualization-based security, guest escape vulnerabilities, or hypervisor-based rootkits
Proficiency in malware analysis, including static and dynamic analysis techniques, behavioral analysis, and code deobfuscation. Experience in identifying and analyzing malware samples to understand their capabilities and potential vulnerabilities
Experience with constraint solving techniques, such as symbolic execution, theorem proving, or model checking, for vulnerability identification, verification, and exploit generation
Background in machine learning, particularly in the context of vulnerability analysis and detection, such as using ML techniques to identify patterns in code or analyze network traffic for anomaly detection
We work to help your intellectual passions and creativity thrive. It's one of our core values: Let your geek flag fly.
We also offer all employees comprehensive benefits including: flexible work schedules, health insurance coverage, paid time off, 401k with a company match, paid parental leave, access to wellness programs and much more. You get this all from day one, and all paid for by RII.
It's all part of another of our core values: Stay human. It's why our comfortable and colorful offices such as our headquarters, include a community game room, pantry, massage chair, and an escape room, among other amenities. It's why we have community ambassadors and regular community events.
Research Innovations, Inc. is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender, gender identity or expression, national origin, genetics, disability status, protected veteran status, age, or any other characteristic protected by state, federal or local law.
#LI-AC1
Auto-ApplyVulnerability Researcher
Maryland jobs
At Two Six Technologies, we build, deploy, and implement innovative products that solve the world's most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what's possible to empower our team and support our customers in building a safer global future.
Overview of Opportunity
Join the Exploitation Sector of Two Six Technologies-a team of dedicated hackers in Northern Virginia and Maryland-where you'll immerse yourself in reverse engineering and vulnerability research on a wide range of embedded systems, software, and operational processes. Working alongside reverse engineers and security researchers, you'll identify vulnerabilities, analyze attack vectors, and assess operational impacts on some of the most critical systems for our customers. Our fast-growing roster of government customers relies on us to deliver advanced security solutions, and we're looking for a Vulnerability Researcher to help us continue pushing boundaries. If you're passionate about vulnerability research which can make a tangible impact on national security, we want you on our team.
This role requires regular on-site support at the Laurel, Maryland customer site.
What you will do:
Identify vulnerabilities and potential attacks across hardware, software, procedures, logistics, and physical security of systems
Develop proof of concept (PoC) code for identified vulnerabilities
Reverse-engineer targeted embedded systems to identify vulnerabilities
Review source-code looking for risks and vulnerabilities
Analyze the effects of vulnerabilities on mission outcomes and operational effectiveness
Compare system attack techniques and propose operationally effective countermeasures
Produce reports, briefings, and perspectives on actual and potential attacks
What you will need (Basic Qualifications):
Bachelor's degree and 2 years of relevant experience, OR Associate's degree and 4 years of relevant experience
Relevant experience: computer/information systems design/development, programming, information/cyber/network security, reverse-engineering, vulnerability analysis, penetration testing, computer forensics, information assurance, or systems engineering
Proficiency in C/C++, Python, and at least one ISA (e.g. x86/ARM/MIPS)
Proficiency in linux command-line environments
Experience using a decompiler such as IDA Pro, Binary Ninja, or Ghidra
Experience using vulnerability research tools such as emulators or fuzzers
Experience using a software debugger such as GDB or WinDbg
Nice If You Have (Preferred):
Experience producing technical briefings for operational stakeholders
Experience using a hardware debugger
Experience with UART, SPI, I2C
Experience with common secure communications such as TLS or SSH
Familiarity with embedded firmware, RTOS, or networked systems
Familiarity with high-side environments
Security Clearance:
Active TS/SCI clearance with Polygraph required
#LI-ZS1
#LI-ONSITE
Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We believe in rewarding skills, experience, and performance. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development.
The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements.
Salary Range
$122,422 - $183,633 USD
Looking for other great opportunities? Check out Two Six Technologies Opportunities for all our Company's current openings!
Ready to make the first move towards growing your career? If so, check out the Two Six Technologies Candidate Journey! This will give you step-by-step directions on applying, what to expect during the application process, information about our rich benefits and perks along with our most frequently asked questions. If you are undecided and would like to learn more about us and how we are contributing to essential missions, check out our Two Six Technologies News page! We share information about the tech world around us and how we are making an impact! Still have questions, no worries! You can reach us at Contact Two Six Technologies. We are happy to connect and cover the information needed to assist you in reaching your next career milestone.
Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law.
If you are an individual with a disability and would like to request reasonable workplace accommodation for any part of our employment process, please send an email to accommodations@twosixtech.com. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.
Additionally, please be advised that this business uses E-Verify in its hiring practices.
By submitting the following application, I hereby certify that to the best of my knowledge, the information provided is true and accurate.
Auto-ApplyProduct Researcher II
Cincinnati, OH jobs
Computech Corporation provides IT and consulting services to various customers across the globe. We are a Minority Certified Company with over 15 years of industry experience. Our global delivery model and proven track record enable companies to realize improved business efficiency and increased profitability.
Job Description
Duration: 2 Months
General Description:
Works independently.
Analyzes technical data to create proof of claim and proof of demo documentation.
Places consumer studies including product procurement and clearance, research questionnaire development, data collection and analysis/reporting.
Additional Information
Experience in Baby Care preferred.
DoD SkillBridge Vulnerability Researcher (Cyber199)
San Antonio, TX jobs
Research Innovations, Inc. (RII) is breaking through the big, slow, status quo with transformative technology that fundamentally changes and improves the world. We develop cutting-edge software for all levels of the government and military. Using agile development practices and user-centered design, we create innovative software solutions for complex real-world problems.
We are seeking a dedicated Vulnerability Research SkillBridge candidate to join our Cyber Security team. In a Vulnerability Research SkillBridge opportunity at RII, you will play a pivotal role in solving unique and challenging problems for our esteemed Defense and Homeland Security customers. This position requires a proactive mindset, deep technical expertise in vulnerability research, reverse engineering, and exploit mitigations/bypasses, and a drive to live one of our core values: Get s#!t done.
This position is specifically for members of the DoD who are transitioning back to civilian life and can take advantage of programs such as SkillBridge. RII has strong connections to the military community, and we understand the transition to civilian life can be stressful-we will help you navigate those challenges. We are an approved DoD partner, and we have supported the transition of several active duty members to civilian roles, many of whom have been offered and accepted full-time employment with RII at the completion of their Skillbridge. During and after, RII provides an industry-leading mentorship and training program to selected applicants, supporting challenging, real, mission-oriented problems.
This position requires an active US Secret security clearance.WHAT YOU WILL BE DOING
Conducting in-depth reverse engineering and vulnerability analysis across various architectures and platforms, including x86/64, ARM, PowerPC, and more
Researching and analyzing operating system and application internals, identifying and understanding security strengths and weaknesses of those systems
Developing and enhancing functionality by adding features and capabilities to undocumented interfaces
Modeling and analyzing in-memory compiled application behavior to identify potential vulnerabilities and improve security measures
Developing and understanding mobile/embedded systems and kernel modules, particularly related to vulnerability research
Participating actively in our extensive Vulnerability Research mentorship program, sharing knowledge and collaborating with colleagues
WHAT YOU HAVE DONE
Proficient understanding of wireless networking and associated security protocols, such as Wi-Fi (802.11), Bluetooth, or cellular networks (2G/3G/4G/5G). Familiarity with common vulnerabilities and attack vectors in wireless communication
Strong grasp of legacy exploit mitigations and bypass techniques, including but not limited to Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP/NX), Stack Cookies (Canaries), and Control Flow Integrity (CFI). Experience in identifying and circumventing these security measures
In-depth knowledge of both security and network fundamentals, such as cryptography, authentication, access control, and network protocols (TCP/IP, UDP, DNS, HTTP, etc.). Understanding the security implications and potential vulnerabilities associated with these concepts
Programming experience with both scripted languages (preferably Python3) and compiled languages (preferably C). Ability to write efficient and secure code for vulnerability research and exploit development purposes
Familiarity with low-level architectures such as x86, ARM, or MIPS. Understanding the underlying principles, instruction sets, and memory models of these architectures for vulnerability identification and analysis
Experience with operating system internals and implementations, including Windows, Linux, or mac OS. Knowledge of system structures, process management, memory management, and security mechanisms at the kernel level
Excellent oral, written, and interpersonal communication skills, with the ability to effectively convey complex technical concepts and interact with customers and team members alike
EVEN BETTER
Experience with vulnerability research and reverse engineering of real-time operating systems (RTOS), such as FreeRTOS, QNX, or VxWorks. Understanding the unique security challenges and attack vectors specific to RTOS environments
Bachelor's or postgraduate degree in Computer Science, Computer Engineering, or a related field
Experience with software protection and binary armoring techniques, such as anti-debugging, code obfuscation, or tamper resistance. Understanding the methods employed to protect software from reverse engineering and vulnerability discovery
Proficiency in agile development methodologies, including Scrum or Kanban, for efficient collaboration and iterative development in a cybersecurity context
Familiarity with low-level iOS/Android development and associated security considerations, such as jailbreaking or rooting, application sandboxing, or secure interprocess communication (IPC)
Knowledge of hypervisors and their security implications, including virtualization-based security, guest escape vulnerabilities, or hypervisor-based rootkits
Proficiency in malware analysis, including static and dynamic analysis techniques, behavioral analysis, and code deobfuscation. Experience in identifying and analyzing malware samples to understand their capabilities and potential vulnerabilities
Experience with constraint solving techniques, such as symbolic execution, theorem proving, or model checking, for vulnerability identification, verification, and exploit generation
Background in machine learning, particularly in the context of vulnerability analysis and detection, such as using ML techniques to identify patterns in code or analyze network traffic for anomaly detection
We work to help your intellectual passions and creativity thrive. It's one of our core values: Let your geek flag fly.
We also offer all employees comprehensive benefits including: flexible work schedules, health insurance coverage, paid time off, 401k with a company match, paid parental leave, access to wellness programs and much more. You get this all from day one, and all paid for by RII.
It's all part of another of our core values: Stay human. It's why our comfortable and colorful offices such as our headquarters, include a community game room, pantry, massage chair, and an escape room, among other amenities. It's why we have community ambassadors and regular community events.
Research Innovations, Inc. is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender, gender identity or expression, national origin, genetics, disability status, protected veteran status, age, or any other characteristic protected by state, federal or local law.
#LI-AC1
Auto-ApplyDoD SkillBridge Vulnerability Researcher (Cyber199)
San Antonio, TX jobs
Job DescriptionResearch Innovations, Inc. (RII) is breaking through the big, slow, status quo with transformative technology that fundamentally changes and improves the world. We develop cutting-edge software for all levels of the government and military. Using agile development practices and user-centered design, we create innovative software solutions for complex real-world problems.
We are seeking a dedicated Vulnerability Research SkillBridge candidate to join our Cyber Security team. In a Vulnerability Research SkillBridge opportunity at RII, you will play a pivotal role in solving unique and challenging problems for our esteemed Defense and Homeland Security customers. This position requires a proactive mindset, deep technical expertise in vulnerability research, reverse engineering, and exploit mitigations/bypasses, and a drive to live one of our core values: Get s#!t done.
This position is specifically for members of the DoD who are transitioning back to civilian life and can take advantage of programs such as SkillBridge. RII has strong connections to the military community, and we understand the transition to civilian life can be stressful-we will help you navigate those challenges. We are an approved DoD partner, and we have supported the transition of several active duty members to civilian roles, many of whom have been offered and accepted full-time employment with RII at the completion of their Skillbridge. During and after, RII provides an industry-leading mentorship and training program to selected applicants, supporting challenging, real, mission-oriented problems.
This position requires an active US Secret security clearance.WHAT YOU WILL BE DOING
Conducting in-depth reverse engineering and vulnerability analysis across various architectures and platforms, including x86/64, ARM, PowerPC, and more
Researching and analyzing operating system and application internals, identifying and understanding security strengths and weaknesses of those systems
Developing and enhancing functionality by adding features and capabilities to undocumented interfaces
Modeling and analyzing in-memory compiled application behavior to identify potential vulnerabilities and improve security measures
Developing and understanding mobile/embedded systems and kernel modules, particularly related to vulnerability research
Participating actively in our extensive Vulnerability Research mentorship program, sharing knowledge and collaborating with colleagues
WHAT YOU HAVE DONE
Proficient understanding of wireless networking and associated security protocols, such as Wi-Fi (802.11), Bluetooth, or cellular networks (2G/3G/4G/5G). Familiarity with common vulnerabilities and attack vectors in wireless communication
Strong grasp of legacy exploit mitigations and bypass techniques, including but not limited to Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP/NX), Stack Cookies (Canaries), and Control Flow Integrity (CFI). Experience in identifying and circumventing these security measures
In-depth knowledge of both security and network fundamentals, such as cryptography, authentication, access control, and network protocols (TCP/IP, UDP, DNS, HTTP, etc.). Understanding the security implications and potential vulnerabilities associated with these concepts
Programming experience with both scripted languages (preferably Python3) and compiled languages (preferably C). Ability to write efficient and secure code for vulnerability research and exploit development purposes
Familiarity with low-level architectures such as x86, ARM, or MIPS. Understanding the underlying principles, instruction sets, and memory models of these architectures for vulnerability identification and analysis
Experience with operating system internals and implementations, including Windows, Linux, or mac OS. Knowledge of system structures, process management, memory management, and security mechanisms at the kernel level
Excellent oral, written, and interpersonal communication skills, with the ability to effectively convey complex technical concepts and interact with customers and team members alike
EVEN BETTER
Experience with vulnerability research and reverse engineering of real-time operating systems (RTOS), such as FreeRTOS, QNX, or VxWorks. Understanding the unique security challenges and attack vectors specific to RTOS environments
Bachelor's or postgraduate degree in Computer Science, Computer Engineering, or a related field
Experience with software protection and binary armoring techniques, such as anti-debugging, code obfuscation, or tamper resistance. Understanding the methods employed to protect software from reverse engineering and vulnerability discovery
Proficiency in agile development methodologies, including Scrum or Kanban, for efficient collaboration and iterative development in a cybersecurity context
Familiarity with low-level iOS/Android development and associated security considerations, such as jailbreaking or rooting, application sandboxing, or secure interprocess communication (IPC)
Knowledge of hypervisors and their security implications, including virtualization-based security, guest escape vulnerabilities, or hypervisor-based rootkits
Proficiency in malware analysis, including static and dynamic analysis techniques, behavioral analysis, and code deobfuscation. Experience in identifying and analyzing malware samples to understand their capabilities and potential vulnerabilities
Experience with constraint solving techniques, such as symbolic execution, theorem proving, or model checking, for vulnerability identification, verification, and exploit generation
Background in machine learning, particularly in the context of vulnerability analysis and detection, such as using ML techniques to identify patterns in code or analyze network traffic for anomaly detection
We work to help your intellectual passions and creativity thrive. It's one of our core values: Let your geek flag fly.
We also offer all employees comprehensive benefits including: flexible work schedules, health insurance coverage, paid time off, 401k with a company match, paid parental leave, access to wellness programs and much more. You get this all from day one, and all paid for by RII.
It's all part of another of our core values: Stay human. It's why our comfortable and colorful offices such as our headquarters, include a community game room, pantry, massage chair, and an escape room, among other amenities. It's why we have community ambassadors and regular community events.
Research Innovations, Inc. is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender, gender identity or expression, national origin, genetics, disability status, protected veteran status, age, or any other characteristic protected by state, federal or local law.
#LI-AC1
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.