Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Senior Vulnerability Researcher (Cyber227) image - Rise Careers
Job details

Senior Vulnerability Researcher (Cyber227)

Research Innovations, Inc. (RII) is breaking through the big, slow, status quo with transformative technology that fundamentally changes and improves the world. We develop cutting-edge software for all levels of the government and military. Using agile development practices and user-centered design, we create innovative software solutions for complex real-world problems.


We are seeking a dedicated Vulnerability Researcher to join our Cyber Security team. As a Vulnerability Researcher at RII, you will play a pivotal role in solving unique and challenging problems for our esteemed Defense and Homeland Security customers. This position requires a proactive mindset, deep technical expertise in vulnerability research, reverse engineering, and exploit mitigations/bypasses, and a drive to live one of our core values: Get s#!t done.


This position requires an Active US Top Secret security clearance, and the ability to upgrade to TS/SCI Special Access Program access


WHAT YOU WILL BE DOING
  • Conducting in-depth reverse engineering and vulnerability analysis across various architectures and platforms, including x86/64, ARM, PowerPC, and more
  • Researching and analyzing operating system and application internals, identifying and understanding security strengths and weaknesses of those systems
  • Developing and enhancing functionality by adding features and capabilities to undocumented interfaces
  • Modeling and analyzing in-memory compiled application behavior to identify potential vulnerabilities and improve security measures
  • Developing and understanding mobile/embedded systems and kernel modules, particularly related to vulnerability research
  • Participating actively in our extensive Vulnerability Research mentorship program, sharing knowledge and collaborating with colleagues


WHAT YOU HAVE DONE
  • Proficient understanding of wireless networking and associated security protocols, such as Wi-Fi (802.11), Bluetooth, or cellular networks (2G/3G/4G/5G). Familiarity with common vulnerabilities and attack vectors in wireless communication
  • Strong grasp of legacy exploit mitigations and bypass techniques, including but not limited to Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP/NX), Stack Cookies (Canaries), and Control Flow Integrity (CFI). Experience in identifying and circumventing these security measures
  • In-depth knowledge of both security and network fundamentals, such as cryptography, authentication, access control, and network protocols (TCP/IP, UDP, DNS, HTTP, etc.). Understanding the security implications and potential vulnerabilities associated with these concepts
  • Programming experience with both scripted languages (preferably Python3) and compiled languages (preferably C). Ability to write efficient and secure code for vulnerability research and exploit development purposes
  • Familiarity with low-level architectures such as x86, ARM, or MIPS. Understanding the underlying principles, instruction sets, and memory models of these architectures for vulnerability identification and analysis
  • Experience with operating system internals and implementations, including Windows, Linux, or macOS. Knowledge of system structures, process management, memory management, and security mechanisms at the kernel level
  • Excellent oral, written, and interpersonal communication skills, with the ability to effectively convey complex technical concepts and interact with customers and team members alike


EVEN BETTER
  • Experience with vulnerability research and reverse engineering of real-time operating systems (RTOS), such as FreeRTOS, QNX, or VxWorks. Understanding the unique security challenges and attack vectors specific to RTOS environments
  • Bachelor's or postgraduate degree in Computer Science, Computer Engineering, or a related field
  • Experience with software protection and binary armoring techniques, such as anti-debugging, code obfuscation, or tamper resistance. Understanding the methods employed to protect software from reverse engineering and vulnerability discovery
  • Proficiency in agile development methodologies, including Scrum or Kanban, for efficient collaboration and iterative development in a cybersecurity context
  • Familiarity with low-level iOS/Android development and associated security considerations, such as jailbreaking or rooting, application sandboxing, or secure interprocess communication (IPC)
  • Knowledge of hypervisors and their security implications, including virtualization-based security, guest escape vulnerabilities, or hypervisor-based rootkits
  • Proficiency in malware analysis, including static and dynamic analysis techniques, behavioral analysis, and code deobfuscation. Experience in identifying and analyzing malware samples to understand their capabilities and potential vulnerabilities
  • Experience with constraint solving techniques, such as symbolic execution, theorem proving, or model checking, for vulnerability identification, verification, and exploit generation
  • Background in machine learning, particularly in the context of vulnerability analysis and detection, such as using ML techniques to identify patterns in code or analyze network traffic for anomaly detection


#LI-AC1


At RII, we believe that diversity in our workforce is critical to our success. We strive to hire great people from a wide variety of backgrounds, not just because it’s the right thing to do, but because it makes us stronger. We work to help your intellectual passions and creativity thrive. It’s one of our core values: Let your geek flag fly.


We also offer all employees comprehensive benefits including: flexible work schedules, health insurance coverage, paid time off, 401k with a company match, paid parental leave, access to wellness programs and much more. You get this all from day one, and all paid for by RII.


It’s all part of another of our core values: Stay human. It’s why our comfortable and colorful offices such as our headquarters, include a community game room, pantry, massage chair, and an escape room, among other amenities. It’s why we have community ambassadors and regular community events.


Research Innovations, Inc. is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender, gender identity or expression, national origin, genetics, disability status, protected veteran status, age, or any other characteristic protected by state, federal or local law.

Research Innovations Glassdoor Company Review
4.4 Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon
Research Innovations DE&I Review
No rating Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon
CEO of Research Innovations
Research Innovations CEO photo
Unknown name
Approve of CEO

Average salary estimate

$120000 / YEARLY (est.)
min
max
$100000K
$140000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Senior Vulnerability Researcher (Cyber227), Research Innovations

At Research Innovations, Inc. (RII), we're rewriting the narrative of cybersecurity as we seek an enthusiastic Senior Vulnerability Researcher to join our vibrant team in St. Pete, FL. You’ll step into a pivotal role, diving headfirst into the fast-paced world of vulnerability research, tackling complex challenges for our valued Defense and Homeland Security customers. If you thrive on breaking boundaries and enjoy the thrill of dissecting everything from operating systems to mobile devices, this is the job for you! In your role, you'll conduct thorough reverse engineering and analysis across different architectures, including x86, ARM, and PowerPC. You'll identify vulnerabilities, navigate security measures, and collaborate with your peers in a supportive mentorship program. With an Active US Top Secret security clearance required, your expertise in programming, network protocols, and exploit development will be put to the test. At RII, innovation is a core value, and we believe in empowering our team to bring their unique skills to the table while enjoying a work culture that promotes creativity and growth. If you're ready to make a significant impact, join us at RII and explore a world where your cybersecurity skills can flourish and shape the future.

Frequently Asked Questions (FAQs) for Senior Vulnerability Researcher (Cyber227) Role at Research Innovations
What are the main responsibilities of a Senior Vulnerability Researcher at Research Innovations, Inc.?

As a Senior Vulnerability Researcher at Research Innovations, Inc., your primary responsibilities will include conducting in-depth reverse engineering and vulnerability analysis across various platforms, developing new features, and enhancing system capabilities. You'll analyze OS and application internals to uncover security strengths and weaknesses and contribute to memory behavior modeling to enhance security measures. Engaging with our mentorship program will also allow you to share your expertise while learning from others.

Join Rise to see the full answer
What qualifications are required for the Senior Vulnerability Researcher position at Research Innovations, Inc.?

To qualify for the Senior Vulnerability Researcher role at Research Innovations, Inc., candidates should have a robust background in cybersecurity, with expertise in vulnerability research, reverse engineering, and coding in languages like Python and C. Familiarity with networking protocols, low-level architectures, and operating system internals is critical. Moreover, possessing an Active US Top Secret security clearance—and the ability to upgrade to TS/SCI—is essential for this role.

Join Rise to see the full answer
How does Research Innovations, Inc. foster collaboration among Senior Vulnerability Researchers?

Research Innovations, Inc. promotes collaboration among Senior Vulnerability Researchers through its extensive mentorship programs, where knowledge sharing is encouraged. Team members regularly engage in discussions about ongoing projects, leverage diverse perspectives to tackle challenging problems, and foster a culture of continuous learning, all while working in a supportive and interactive environment.

Join Rise to see the full answer
What makes working at Research Innovations, Inc. rewarding for a Senior Vulnerability Researcher?

Working at Research Innovations, Inc. as a Senior Vulnerability Researcher is rewarding due to the mix of innovative projects and a vibrant work culture. You'll find yourself engaged with groundbreaking technologies while being supported by a team that values creativity and personal growth. Benefits such as flexible work options, comprehensive health coverage, and fun communal spaces create a dynamic and enjoyable working atmosphere.

Join Rise to see the full answer
What tools and technologies does a Senior Vulnerability Researcher use at Research Innovations, Inc.?

At Research Innovations, Inc., a Senior Vulnerability Researcher utilizes a variety of tools and technologies, including reverse engineering software, network analyzers, and programming languages such as Python and C. Knowledge of security protocols, vulnerability analysis tools, and debugging platforms is also crucial to effectively identify and mitigate vulnerabilities across different systems and architectures.

Join Rise to see the full answer
Common Interview Questions for Senior Vulnerability Researcher (Cyber227)
Can you describe your experience with reverse engineering techniques?

In answering this question, focus on specific reverse engineering projects you've worked on. Discuss the tools you utilized, the types of applications analyzed, and any vulnerabilities you uncovered. This will demonstrate your hands-on experience and understanding of reverse engineering methodologies.

Join Rise to see the full answer
What strategies do you apply when conducting vulnerability analysis?

When discussing your strategies for vulnerability analysis, describe the systematic approach you follow. Talk about how you assess system architecture, explore code behavior, and utilize automated tools in combination with manual techniques to identify vulnerabilities comprehensively.

Join Rise to see the full answer
How do you stay updated with the latest cybersecurity trends and vulnerabilities?

Highlight your commitment to continuous learning by naming specific resources you follow, such as cybersecurity blogs, conferences, forums, or online courses. Mention any professional organizations you belong to and how they help you stay informed about new threats and defense strategies.

Join Rise to see the full answer
How do you prioritize vulnerabilities for remediation?

Explain your method for assessing and prioritizing vulnerabilities by considering factors like potential impact, exploitability, and the criticality of affected systems. Mention tools or frameworks you use to determine risk levels and guide effective remediation efforts.

Join Rise to see the full answer
Can you explain a complex vulnerability you discovered and how you communicated it to your team?

Use this question to showcase a specific vulnerability you identified, detailing its nature and potential impact. Discuss how you documented your findings and communicated your results to ensure that your team understood the risks and remediation steps involved.

Join Rise to see the full answer
What programming languages are you most comfortable with for exploit development?

Share your proficiency in relevant programming languages, specifically Python and C, and any projects where you applied these skills to exploit development. Emphasize your ability to write secure code and how you've implemented coding best practices.

Join Rise to see the full answer
Describe your understanding of legacy exploit mitigations.

In your response, discuss specific legacy exploit mitigations like ASLR, DEP, and CFI. Explain how they work and any experiences you have in circumventing these security measures in research or practical scenarios.

Join Rise to see the full answer
What are the biggest challenges you face in vulnerability research?

Reflect on challenges such as staying abreast of evolving threats, addressing complex system security issues, or working with legacy systems. Discuss how you approach these challenges and your strategies for overcoming them.

Join Rise to see the full answer
How do you collaborate with other team members during the vulnerability research process?

Describe your collaborative approach, emphasizing communication and knowledge sharing. Mention how you participate in team meetings, contribute to brainstorming sessions, and support junior team members in their learning.

Join Rise to see the full answer
What motivates you to work in vulnerability research?

Express your passion for cybersecurity and the impact you can have by uncovering vulnerabilities. Talk about how solving complex problems and contributing to the safety of systems and data fuels your enthusiasm for the industry.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User
Posted 4 days ago
Posted 11 days ago
Photo of the Rise User
Posted 3 days ago
Dental Insurance
Disability Insurance
Flexible Spending Account (FSA)
Health Savings Account (HSA)
Vision Insurance
Performance Bonus
Family Medical Leave
Paid Holidays
Photo of the Rise User
Posted yesterday
Photo of the Rise User
Posted 8 days ago
Photo of the Rise User
Posted 7 days ago
Photo of the Rise User
Posted 2 days ago
Inclusive & Diverse
Diversity of Opinions
Passion for Exploration
Dare to be Different
Empathetic
Growth & Learning
Paid Holidays
Medical Insurance
Equity
401K Matching
Learning & Development
Social Gatherings
Flex-Friendly
Maternity Leave
Paternity Leave
Sabbatical
Photo of the Rise User
Posted 10 days ago
Photo of the Rise User
Zuri Group Remote United States - Remote Flexibility
Posted 13 days ago

Research Innovations Inc. (RII) supports critical defense, intelligence, and cyber customers across the U.S. Government and with select international customers. RII is a leader in Joint All-Domain Command and Control (JADC2) efforts with its cutti...

28 jobs
MATCH
VIEW MATCH
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
March 23, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!
LATEST ACTIVITY
Photo of the Rise User
10 people applied to Security Analyst Jr at DEUNA
Photo of the Rise User
Someone from OH, Cincinnati just viewed Data Scientist at Apex Systems
Photo of the Rise User
Someone from OH, Mansfield just viewed POS Install Tech at TEKsystems
Photo of the Rise User
10 people applied to ITSM Specialist at Datacom
Photo of the Rise User
Someone from OH, Dublin just viewed Sr. Manager UX Design Research at Visa
Photo of the Rise User
Someone from OH, Columbus just viewed Case Manager at Release Recovery
Photo of the Rise User
54 people applied to Jr SOC Analyst at IBM
Photo of the Rise User
Someone from OH, Cincinnati just viewed Recruiting Coordinator (Contractor) at Anduril Industries
Photo of the Rise User
Someone from OH, Dublin just viewed Field Support Technicians - (Phoenix) at Nordstrom
Photo of the Rise User
Someone from OH, Stow just viewed IT Asset administrator at Ergomed
Photo of the Rise User
Someone from OH, Loveland just viewed Senior Buyer (wholesale) (m/f/d) at ABOUT YOU SE & Co. KG
Photo of the Rise User
Someone from OH, Cincinnati just viewed Summer 2025 Internship: Talent at Hylant
C
Someone from OH, Cincinnati just viewed Senior Instructional Designer at CXG
Photo of the Rise User
Someone from OH, Youngstown just viewed Compliance Specialist, Anti-Corruption Program at ServiceNow
Photo of the Rise User
Someone from OH, Cleveland just viewed Finance Intern - Summer 2025 at Spectrum
Photo of the Rise User
Someone from OH, Cleveland just viewed QC Engineer at QODE
Photo of the Rise User
Someone from OH, Cleveland just viewed Getinge is hiring: UI/UX Developer in Streetsboro at Getinge
Photo of the Rise User
Someone from OH, Westerville just viewed Data analyst | Mid at Nord Security
Photo of the Rise User
Someone from OH, North Canton just viewed Researcher-NBC Sports at NBCUniversal