About the Role
Windows Kernel & Vulnerability Research Engineer<br />
Chantilly, VA<br />
TS/SCI to startÂ
<p><strong>Key Responsibilities</strong></p>
<ul>
<li>
<p>Conduct in-depth research into <strong>Windows internals</strong>, including system architecture, memory management, drivers, processes, and kernel-mode operations.</p>
</li>
<li>
<p>Perform <strong>reverse engineering</strong> of Windows binaries, drivers, and firmware using industry-standard tools.</p>
</li>
<li>
<p>Identify, analyze, and document <strong>zero-day vulnerabilities</strong> and security weaknesses across kernel and user-mode components.</p>
</li>
<li>
<p>Develop <strong>proof-of-concept (PoC)</strong> code to demonstrate impact and exploitability of discovered vulnerabilities.</p>
</li>
<li>
<p>Collaborate with engineering teams to design <strong>mitigations</strong>, security patches, and hardening strategies.</p>
</li>
<li>
<p>Analyze exploit techniques, malware samples, and emerging threat vectors affecting Windows platforms.</p>
</li>
<li>
<p>Contribute to internal knowledge bases, tooling, and automation that streamline research workflows.</p>
</li>
</ul>
<p><strong>Required Qualifications</strong></p>
<ul>
<li>
<p>Strong understanding of <strong>Windows operating system internals</strong>, including kernel architecture, drivers, APIs, memory layout, and subsystem behavior.</p>
</li>
<li>
<p>Proficiency in <strong>C/C++</strong>, with experience writing or analyzing kernel-mode code and Windows drivers.</p>
</li>
<li>
<p>Expertise in <strong>reverse engineering tools</strong> such as IDA Pro, Ghidra, WinDbg, x64dbg, or Binary Ninja.</p>
</li>
<li>
<p>Solid grasp of <strong>assembly language</strong> (x86/x64) and low-level debugging.</p>
</li>
<li>
<p>Experience conducting <strong>vulnerability research</strong> or exploit development in Windows environments.</p>
</li>
<li>
<p>Familiarity with common exploit mitigation techniques (ASLR, DEP, CFG, SMEP/SMAP, etc.).</p>
</li>
</ul>
<p><strong>Preferred Qualifications</strong></p>
<ul>
<li>
<p>Prior experience discovering and responsibly disclosing security vulnerabilities.</p>
</li>
<li>
<p>Knowledge of <strong>kernel exploitation techniques</strong>, sandbox escapes, or privilege escalation attacks.</p>
</li>
<li>
<p>Understanding of malware analysis, rootkits, or advanced persistent threats.</p>
</li>
<li>
<p>Contributions to open-source security tools or research publications.</p>
</li>
<li>
<p>Experience with scripting languages (Python, PowerShell) for automation.</p>
</li>
</ul>
<p><strong>Who You Are</strong></p>
<ul>
<li>
<p>Curious, analytical, and passionate about low-level technologies.</p>
</li>
<li>
<p>Comfortable diving into undocumented features and complex system behavior.</p>
</li>
<li>
<p>Able to work independently while collaborating effectively across teams.</p>
</li>
</ul>