×
Register Here to Apply for Jobs or Post Jobs. X

Vulnerability Researcher, Senior Associate Security Clearance

Job in Chantilly, Fairfax County, Virginia, 20151, USA
Listing for: Peraton
Full Time position
Listed on 2026-02-06
Job specializations:
  • Engineering
    Cybersecurity, Systems Engineer
Job Description & How to Apply Below
Position: Vulnerability Researcher, Senior Associate with Security Clearance
About Peraton Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace.

The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees solve the most daunting challenges that our customers face. Visit  to learn how we're keeping people around the world safe and secure. Program Overview About

The Role We are seeking multiple Vulnerability Researchers to support a highly sensitive government customer in Virginia. This role focuses on advanced vulnerability discovery and exploitation across software, hardware, and networked systems in support of mission-critical operational and analytic capabilities. The ideal candidate brings hands-on expertise in identifying, understanding, and exploiting complex security weaknesses relevant to national security and lawful collection missions.

This is a highly technical role for researchers who thrive on solving hard problems and redefining the boundaries of vulnerability research. This role aligns closely with Computer Network Exploitation (CNE) and Computer Network Operations (CNO) mission sets and requires hands-on vulnerability discovery, reverse engineering, and exploit development beyond automated tools. The ideal candidate goes beyond automated scanning, brings hands-on expertise in identifying, understanding, and exploiting complex security weaknesses relevant to national security and lawful collection missions.

Key Responsibilities
* Conduct advanced vulnerability research to identify, analyze, and exploit weaknesses in host, mobile, web, and network-based systems.

* Perform hands-on testing using black-box, white-box and grey-box methodologies to uncover previously unknown vulnerabilities.

* Develop proof-of-concept exploits and clearly document technical findings for operational, forensic, and analytic use cases.

* Apply reverse engineering, debugging, and binary analysis techniques to understand system behavior and root causes of vulnerabilities.

* Support the development and enhancement of technical capabilities addressing sophisticated threats from criminal and nation-state actors.

* Provide technical leadership and expert guidance on complex research efforts, contributing to project planning and execution.

* Communicate complex technical concepts and recommendations effectively to both technical and non-technical stakeholders.
Qualifications Basic Qualifications

* Education / Experience:

* BS/BA with 2+ years of relevant experience or 6 years with no degree

* Advanced certifications, specialized training, or equivalent hands-on experience may be considered in lieu of years of experience.

* Experience with vulnerability research, exploitation development, or advanced security analysis

* Knowledge of exploitation techniques

* Experience in writing exploits in one or more of the following: C, C++, Python and Ruby

* Active TS/SCI security clearance is required; ability to obtain a polygraph.

Desired Qualifications
* Experience with vulnerability discovery and exploitation beyond automated tools, including:

* Fuzzing techniques and exploit development

* Reverse engineering, debugging, and binary analysis

* Black-box, gray-box and white-box testing methodologies

* Web application vulnerability research

* Hardware and embedded systems security

* Experience with industry-standard tools and frameworks such as:

* IDA Pro, Ghidra

* x64

DBG, WinDBG

* Wireshark, Scapy (Python)

* Burp Suite, OWASP frameworks

* Metasploit

* Understanding of computer science fundamentals, system internals, and network protocols.

* Analytical, problem-solving, and research skills with a passion for tackling complex technical challenges.

* Ability to contribute to complex technical…
Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary