Demo

Vulnerability Researcher

ARSIEM
Meade, MD Full Time
POSTED ON 1/7/2025
AVAILABLE BEFORE 3/7/2025

About ARSIEM Corporation


At ARSIEM Corporation we are committed to fostering a proven and trusted partnership with our government clients.  We provide support to multiple agencies across the United States Government.  ARSIEM has an experienced workforce of qualified professionals committed to providing the best possible support.


As demand increases, ARSIEM continues to provide reliable and cutting-edge technical solutions at the best value to our clients.  That means a career packed with opportunities to grow and the ability to have an impact on every client you work with. 


ARSIEM is looking for Vulnerability Researchers, Levels 1 - 3. Candidates must have experience conduction reverse engineering of hardware, software applications, and operating systems to determine functionality, code structure, and circuit design for use in the discovery of initial access capabilities. Candidates will develop proof-of-concept exploits against research targets, prototypes, and hands-on demonstrations of vulnerability analysis results. This position will support one of our Government clients in Ft. Meade, MD.

\n


Level 1 Vulnerability Researcher Responsibilities
  • Provide engineering and vulnerability research results related to hardware components, software applications, and operating systems to determine functionality, code structure, and system design for use in the discovery of initial access capabilities.
  • Actively debug software and troubleshoot issues with software crashes and programmatic flow
  • Provide written reports, proof-of-concept code, prototypes, and hands-on demonstrations of reverse engineering and vulnerability analysis results, and
  • Provide/author and participate in technical presentations on assigned projects


Level 1 Vulnerability Researcher Qualifications
  • Bachelor's Degree in Computer Science or related field, or minimum two (2) years experience in computer science, information systems, or network engineering 
  • Minimum two (2) years experience programming in Assembly, C, C#, C , Perl, or Python.
  • Minimum two (2) years of demonstrated experience in either hardware or software reverse engineering.


Level 2 Vulnerability Researcher Responsibilities
  • Provide engineering and vulnerability research results related to hardware components, software applications, and operating systems to determine functionality, code structure, and system design for use in the discovery of initial access capabilities.
  • Actively debug software and troubleshoot issues with software crashes and programmatic flow
  • Ability to perform source code analysis in an effort to discover software flaws, and
  • provide/author documentation on the impact and severity of the flaw
  • Ability to develop proof-of-concept exploits against research targets, prototypes, and hands-on demonstrations of vulnerability analysis results
  • Provide/author and participate in technical presentations on assigned projects
  • Lead reverse engineering and vulnerability research of hardware components, software applications, and operating systems to determine functionality, code structure, and circuit design for the use in the discovery of initial access capabilities 


Level 2 Vulnerability Researcher Qualifications
  • Meets all qualifications of a CNO Vulnerability Researcher/Analyst I, but has the following increased experience and skill levels
  • Minimum four (4) years experience programming in Assembly, C, C#, C , Perl, or Python for a production environment
  • Minimum of five (5) years contiguous experience in computer science, information systems, or network engineering; or Bachelor's Degree in Computer Science or related field plus minimum three (3) years contiguous experience
  • Minimum four (4) years demonstrated experience in either hardware or software reverse engineering


Level 3 Vulnerability Researcher Responsibilities
  • Provide engineering and vulnerability research results related to hardware components, software applications, and operating systems to determine functionality, code structure, and system design for use in the discovery of initial access capabilities.
  • Lead efforts to debug software and troubleshoot issues with software crashes and programmatic flow
  • Ability to perform source code analysis in an effort to discover software flaws, and provide/author documentation on the impact and severity of the flaw
  • Ability to develop robust exploits (advancements beyond initial proof-of-concept such as version coverage, decreased failure rate, handling edge cases, etc.) against research targets, prototypes, and hands-on demonstrations of vulnerability analysis results 
  • Edit/Approve and participate in technical presentations on assigned projects
  • Subject Matter Expert and Leader of at least one technology area responsible for reverse engineering and vulnerability analysis of hardware components, software applications, and operating systems to determine functionality, code structure, and circuit design for the use in the discovery of initial access capabilities 


Level 3 Vulnerability Researcher Qualifications
  • Meets all qualifications of a CNO Vulnerability Researcher/Analyst II, but has the following increased experience and skill levels
  • Proven results from participation in vulnerability discovery efforts within the last twelve (12) months
  • Demonstrated ability to discover multiple previously unknown vulnerabilities (0-day) across multiple versions of similar technologies.
  • Demonstrated ability to discover multiple previously unknown vulnerabilities (0-day) that achieve reliable remote code execution and/or reliable privilege escalation.


Desired Skills for All Levels
  • Experience programming in Assembly, C, C#, C , Perl, or Python with a focus on an understanding of system interactions with these libraries vs. production-style environments
  • Use of Unix/Windows system API’s
  • Understanding of virtual function tables in C
  • Heap allocation strategies and protections
  • Experience with very large software projects a plus
  • Kernel programming experience (WDK / Unix||Linux) a significant plus
  • Hardware/Software reverse engineering, which often includes the use of tools (e.g., IDA Pro, Ghidra, Binary Ninja) to identify abstract concepts about the code flow of an application.
  • For Hardware reverse engineering, candidates are expected to have performed analysis of embedded devices, focusing primarily on identifying the software stack and points of entry to the hardware (e.g., not interested in FPGA reverse engineering, or other circuit reverse engineering).
  • Candidates who can merge low-level knowledge about the compilation of C/C code with a nuanced understanding of system design to identify and exploit common vulnerability patterns. Candidates should be comfortable with, at a minimum, user-mode stack-based buffer overflows, and heap-based exploitation strategies.


\n
$148,000 - $235,000 a year
The ARSIEM pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other laws.

Benefits:
For an overview of our benefits, please visit our benefits tab.
https://www.arsiem.com/careers/

Original Posting Date:
2021-07-13
\n

Clearance Requirement: This position requires an active TS/SCI with a polygraph. You must be a US Citizen for consideration.

 

Candidate Referral: Do you know someone who would be GREAT at this role? If you do, ARSIEM has a way for you to earn a bonus through our referral program for persons presenting NEW (not in our resume database) candidates who are successfully placed on one of our projects. The bonus for this position is $10,000, and the referrer is eligible to receive the sum for any applicant we are able to place within 12 months of referral. The bonus is paid after the referred employee reaches 6 months of employment.


ARSIEM is proud to be an Equal Opportunity and Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other federally protected class.

Salary : $148,000 - $235,000

If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution. Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right. Surveys & Data Sets

What is the career path for a Vulnerability Researcher?

Sign up to receive alerts about other jobs on the Vulnerability Researcher career path by checking the boxes next to the positions that interest you.
Income Estimation: 
$98,763 - $126,233
Income Estimation: 
$116,330 - $143,011
Income Estimation: 
$113,077 - $147,784
Income Estimation: 
$135,356 - $164,911
Income Estimation: 
$153,053 - $187,211
Income Estimation: 
$153,902 - $198,246
Income Estimation: 
$113,077 - $147,784
Income Estimation: 
$135,356 - $164,911
Income Estimation: 
$153,902 - $198,246
Income Estimation: 
$116,330 - $143,011
Income Estimation: 
$135,356 - $164,911
Income Estimation: 
$153,902 - $198,246

Sign up to receive alerts about other jobs with skills like those required for the Vulnerability Researcher.

Click the checkbox next to the jobs that you are interested in.

  • Bug/Defect Analysis Skill

    • Income Estimation: $74,092 - $105,774
    • Income Estimation: $82,809 - $110,162
  • Computer Simulation Skill

    • Income Estimation: $77,439 - $91,585
    • Income Estimation: $77,510 - $95,546
View Core, Job Family, and Industry Job Skills and Competency Data for more than 15,000 Job Titles Skills Library

Job openings at ARSIEM

ARSIEM
Hired Organization Address Omaha, NE Full Time
About ARSIEM Corporation At ARSIEM Corporation we are committed to fostering a proven and trusted partnership with our g...
ARSIEM
Hired Organization Address Annapolis, MD Full Time
About ARSIEM Corporation At ARSIEM Corporation we are committed to fostering a proven and trusted partnership with our g...
ARSIEM
Hired Organization Address Annapolis, MD Full Time
About ARSIEM Corporation At ARSIEM Corporation we are committed to fostering a proven and trusted partnership with our g...
ARSIEM
Hired Organization Address Annapolis, MD Full Time
About ARSIEM Corporation At ARSIEM Corporation we are committed to fostering a proven and trusted partnership with our g...

Not the job you're looking for? Here are some other Vulnerability Researcher jobs in the Meade, MD area that may be a better fit.

Vulnerability Researcher

ARSIEM Corporation, Maryland, NY

Vulnerability Researcher

AnaVation, Chantilly, VA

AI Assistant is available now!

Feel free to start your new journey!