×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Vulnerability & Exploitation Specialist Security Clearance

Remote / Online - Candidates ideally in
Annapolis, Anne Arundel County, Maryland, 21403, USA
Listing for: GRVTY
Remote/Work from Home position
Listed on 2026-02-28
Job specializations:
  • Engineering
    Cybersecurity
Salary/Wage Range or Industry Benchmark: 60000 - 80000 USD Yearly USD 60000.00 80000.00 YEAR
Job Description & How to Apply Below
Position: Vulnerability & Exploitation Specialist with Security Clearance

What Impact You'll Have

Our team conducts Vulnerability Research and Reverse Engineering in a rapid prototyping, R&D environment. On this highly-visible program, you can get your hands dirty with a wide variety of tools and systems and get a chance to do some of the really cool things that can be done with a CNO skill set. The project consists of small teams working closely with customers to respond to specific mission needs, create new tools and techniques, and address ongoing challenges.

This work is very hands-on, and the culture supports developing talent and letting smart people grow and tackle real-world challenges in a flexible, fun environment. On this project you could work with C/C++, Python, Assembly (x86/x64), Java, mobile OS's, windows, linux, RE and debugging tools, and more. Work on this program takes place in both customer and contractors SCIFs in the Annapolis Junction, MD area (we cannot support remote work) and requires a TS/SCI + Poly clearance (acceptable to this customer).

What

You'll Be Owning

GRVTY is seeking a Vulnerability & Exploitation Specialist with a TS/SCI + Poly clearance (applicable to this customer) to join one of our top projects in Annapolis Junction, MD. We are looking for candidates who have discovered a 0-day vulnerabilities or a list of CVEs (public vulnerability disclosures) they discovered or contributed to. We are also looking for any specific work they've done exploiting vulnerabilities.

What

You Must Have
  • Active TS/SCI with Polygraph Clearance
  • Skills/experience listed out in order of priority:
  • 0-day vulnerabilities or CVEs discovered and attributed to themselves
  • History performing vulnerability research
  • Experience with writing or using fuzzers
  • AFL, Lib Fuzzer, Cluster Fuzz, oss-fuzz
  • Experience with code analysis tools
  • CodeQL, Joern, Semgrep
  • History of exploiting or productizing 0-day vulnerabilities
  • History of exploiting or productizing n-day vulnerabilities/CVEs/publicly disclosed vulnerabilities
  • History of reverse engineering malware or other code for CNE purposes
  • Experience with reverse engineering tools
  • Ghidra, Ida Pro, Binary Ninja Experience using debuggers
  • GDB or Win Dbg
  • Experience writing, navigating, and building C/C++ code
  • Experience with tools like VsCode, Visual Studio, VIM/Emacs
  • Familiarity with ARM or MIPS architectures and Linux variants
  • We also use Python to write a lot of our tools, so that is good to see
#J-18808-Ljbffr
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary