/Windows Kernel & Vulnerability Research Engineer

Windows Kernel & Vulnerability Research Engineer

Chantilly, Virginiausvia direct
// Job Type
Full Time
// Salary
Not disclosed
// Posted
5 months ago

About the Role

Windows Kernel &amp; Vulnerability Research Engineer<br /> Chantilly, VA<br /> TS/SCI to start  <p><strong>Key Responsibilities</strong></p> <ul> <li> <p>Conduct in-depth research into <strong>Windows internals</strong>, including system architecture, memory management, drivers, processes, and kernel-mode operations.</p> </li> <li> <p>Perform <strong>reverse engineering</strong> of Windows binaries, drivers, and firmware using industry-standard tools.</p> </li> <li> <p>Identify, analyze, and document <strong>zero-day vulnerabilities</strong> and security weaknesses across kernel and user-mode components.</p> </li> <li> <p>Develop <strong>proof-of-concept (PoC)</strong> code to demonstrate impact and exploitability of discovered vulnerabilities.</p> </li> <li> <p>Collaborate with engineering teams to design <strong>mitigations</strong>, security patches, and hardening strategies.</p> </li> <li> <p>Analyze exploit techniques, malware samples, and emerging threat vectors affecting Windows platforms.</p> </li> <li> <p>Contribute to internal knowledge bases, tooling, and automation that streamline research workflows.</p> </li> </ul> <p><strong>Required Qualifications</strong></p> <ul> <li> <p>Strong understanding of <strong>Windows operating system internals</strong>, including kernel architecture, drivers, APIs, memory layout, and subsystem behavior.</p> </li> <li> <p>Proficiency in <strong>C/C++</strong>, with experience writing or analyzing kernel-mode code and Windows drivers.</p> </li> <li> <p>Expertise in <strong>reverse engineering tools</strong> such as IDA Pro, Ghidra, WinDbg, x64dbg, or Binary Ninja.</p> </li> <li> <p>Solid grasp of <strong>assembly language</strong> (x86/x64) and low-level debugging.</p> </li> <li> <p>Experience conducting <strong>vulnerability research</strong> or exploit development in Windows environments.</p> </li> <li> <p>Familiarity with common exploit mitigation techniques (ASLR, DEP, CFG, SMEP/SMAP, etc.).</p> </li> </ul> <p><strong>Preferred Qualifications</strong></p> <ul> <li> <p>Prior experience discovering and responsibly disclosing security vulnerabilities.</p> </li> <li> <p>Knowledge of <strong>kernel exploitation techniques</strong>, sandbox escapes, or privilege escalation attacks.</p> </li> <li> <p>Understanding of malware analysis, rootkits, or advanced persistent threats.</p> </li> <li> <p>Contributions to open-source security tools or research publications.</p> </li> <li> <p>Experience with scripting languages (Python, PowerShell) for automation.</p> </li> </ul> <p><strong>Who You Are</strong></p> <ul> <li> <p>Curious, analytical, and passionate about low-level technologies.</p> </li> <li> <p>Comfortable diving into undocumented features and complex system behavior.</p> </li> <li> <p>Able to work independently while collaborating effectively across teams.</p> </li> </ul>

Interested in this job?

Login to Apply

Use our AI to tailor your resume for this Windows Kernel & Vulnerability Research Engineer position at The Josef Group.