What are the responsibilities and job description for the Vulnerability Researcher position at Radiance Technologies?
Radiance Technologies, a rapidly growing employee owned company supporting multiple technology development efforts is searching for energetic and motivated individuals with knowledge of cyber vulnerability research in operational weapon systems. We are looking for a self-starter with excellent technical skills to work as part of a small team of engineers and analysts conducting reverse engineering and identifying and developing vulnerabilities into exploits.
Radiance Technologies is an employee-owned company with benefits that are unmatched by most companies in the Dayton OH area. Employee ownership, generous 401K, full health/dental/life/vision insurance benefits, educational reimbursement, competitive salaries, interesting assignments and a pleasant work environment combine to make Radiance Technologies a great place to work and succeed.
Required Qualifications
Radiance Technologies is an employee-owned company with benefits that are unmatched by most companies in the Dayton OH area. Employee ownership, generous 401K, full health/dental/life/vision insurance benefits, educational reimbursement, competitive salaries, interesting assignments and a pleasant work environment combine to make Radiance Technologies a great place to work and succeed.
Required Qualifications
- Active Secret Security Clearance or higher
- 3 years of direct work experience
- Experience with software binary analysis using disassemblers such as Ghidra, IDA Pro, or Binary Ninja
- Able to discover, characterize and document cyber vulnerabilities
- Able to develop proof of concept (POC) exploits
- Proficiency with assembly languages, such as x86, ARM, PPC, etc.
- Proficiency with programming languages, such as C, C , Python, etc.
- Experience with cyber vulnerability discovery
- Bachelor’s degree in STEM
- Experience with live binary analysis tools and techniques such as debuggers, system call tracers, fuzzers, network traffic monitors, etc.
- Experience developing custom software and hardware tools to assist in performing reverse engineering and vulnerability analysis
- Experience with symbolic or concolic binary analysis tools such as angr, Z3
- TS//SCI Clearance