Cleared Vulnerability Research Engineer
Listed on 2026-02-01
-
Engineering
Cybersecurity -
IT/Tech
Cybersecurity
We are Bugcrowd. Since 2012, we've been empowering organizations to take back control and stay ahead of threat actors by uniting the collective ingenuity and expertise of our customers and trusted alliance of elite hackers, with our patented data and AI‑powered Security Knowledge Platform™. Our network of hackers brings diverse expertise to uncover hidden weaknesses, adapting swiftly to evolving threats, even against zero‑day exploits.
With unmatched scalability and adaptability, our data and AI‑driven Crowd Match™ technology in our platform finds the perfect talent for your unique fight. We aim to create a new era of modern crowdsourced security that outpaces threat actors. Unleash the ingenuity of the hacker community with Bugcrowd, visit Based in San Francisco and New Hampshire, Bugcrowd is supported by General Catalyst, Rally Ventures, Costanoa Ventures, and others.
This role is focused on end‑to‑end exploit development for real‑world targets. The specialist will design, develop, and validate novel vulnerability discovery and exploitation capabilities against complex software and systems. Work is conducted at the operating system, binary, and micro‑architectural levels, with a strong emphasis on creating new technical capabilities. Success in this position requires the ability to independently translate an under‑defined mission objective into a concrete, technically novel capability and the comfort of operating with minimal supervision, incomplete problem definitions, and delayed feedback.
Education,Experience, Knowledge, Skills, and Abilities
- Design, develop, and validate novel vulnerability discovery and exploitation capabilities.
- Conduct expert reverse engineering of binaries (x86-64, ARM
64, etc.) using industry‑standard tools. - Identify and exploit real‑world vulnerabilities such as Use‑after‑free, Type confusion, Integer truncation, and Buffer overflow.
- Demonstrate ability to discover new, novel vulnerabilities in complex systems.
- Rapidly understand current vulnerability research and apply findings to identify new instances of vulnerability classes.
- Employ both manual analysis and automated techniques (e.g., fuzzing) for vulnerability discovery.
- Code and debug complex functions in C, Python, and Assembly (x86-64, ARM, etc.).
- Independently manage and execute research objectives, including scoping, research, experimentation, validation, and iteration.
- Travel to customer sites as required.
- Perform on‑site work for extended periods of time.
- Expertise in reverse engineering of binaries (x86-64, ARM
64, etc.) using tools such as Binary Ninja, Ghidra, or IDA Pro. - Precise understanding of stack and heap objects and exploit‑relevant vulnerabilities (e.g., Use‑after‑free, Type confusion, Integer truncation, Buffer overflow).
- Demonstrated ability to discover new vulnerabilities, not just exploit known ones.
- Experience with both manual analysis and automated techniques (e.g., fuzzing).
- Ability to code and debug in C, Python, and Assembly (x86-64, ARM, etc.).
- Ability to independently translate an under‑defined mission objective into a concrete, technically novel capability.
- Comfort operating with minimal supervision.
- TS/SCI clearance required (inactive SCI acceptable if SCI‑clearable).
- Ability to travel to customer sites as required.
Physical Requirements
The ideal candidate must be able to complete all physical requirements of the job with or without reasonable accommodation.
- Sitting and / or standing – Must be able to remain in a stationary position 50% of the time.
- Carrying and / or lifting – Must be able to carry / move laptop as needed throughout the work day.
- Environment – remote, work‑from‑home with travel to customer location in Alabama to perform work in cleared spaces.
Bugcrowd is committed to the full inclusion of all qualified individuals. In keeping with our commitment, Bugcrowd will take the steps to assure that people with disabilities are provided reasonable accommodations. Accordingly, if reasonable accommodation is required to fully participate in the…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).