Vulnerability & Exploitation Specialist with Security ...
GRVTY - Annapolis, MD
Apply NowJob Description
What Impact You'll Have: Our team conducts Vulnerability Research and Reverse Engineering in a rapid prototyping, R&D environment. On this highly-visible program, you can get your hands dirty with a wide variety of tools and systems and get a chance to do some of the really cool things that can be done with a CNO skill set. The project consists of small teams working closely with customers to respond to specific mission needs, create new tools and techniques, and address ongoing challenges. This work is very hands-on, and the culture supports developing talent and letting smart people grow and tackle real-world challenges in a flexible, fun environment. On this project you could work with C/C++, Python, Assembly (x86/x64), Java, mobile OS's, windows, linux, RE and debugging tools, and more. Work on this program takes place in both customer and contractors SCIFs in the Annapolis Junction, MD area (we cannot support remote work) and requires a TS/SCI Poly clearance (acceptable to this customer). What You'll Be Owning: GRVTY is seeking a Vulnerability & Exploitation Specialist with a TS/SCI Poly clearance (applicable to this customer) to join one of our top projects in Annapolis Junction, MD. We are looking for candidates who have discovered a 0-day vulnerabilities or a list of CVEs (public vulnerability disclosures) they discovered or contributed to. We are also looking for any specific work they've done exploiting vulnerabilities. What You Must Have:Active TS/SCI with Polygraph ClearanceSkills/experience listed out in order of priority:0-day vulnerabilities or CVEs discovered and attributed to themselvesHistory performing vulnerability researchExperience with writing or using fuzzers - AFL, LibFuzzer, ClusterFuzz, oss-fuzzExperience with code analysis tools - CodeQL, Joern, SemgrepHistory of exploiting or productizing 0-day vulnerabilitiesHistory of exploiting or productizing n-day vulnerabilities/CVEs/publicly disclosed vulnerabilitiesHistory of reverse engineering malware or other code for CNE purposesExperience with reverse engineering tools - Ghidra, Ida Pro, Binary Ninja Experience using debuggers - GDB or WinDbgExperience writing, navigating, and building C/C++ codeExperience with tools like VsCode, Visual Studio, VIM/EmacsFamiliarity with ARM or MIPS architectures and Linux variantsWe also use Python to write a lot of our tools, so that is good to seebfb3568a-762b-4989-884b-a9682aa104ca
Created: 2026-03-07