10 days ago

Windows Vulnerability Researcher

Booz Allen Hamilton

Hybrid
Full Time
$140,000
Hybrid

Job Overview

Job TitleWindows Vulnerability Researcher
Job TypeFull Time
CategoryCommerce
Experience5 Years
DegreeMaster
Offered Salary$140,000
LocationHybrid

Who's the hiring manager?

Sign up to PitchMeAI to discover the hiring manager's details for this job. We will also write them an intro email for you.

Uncover Hiring Manager

Job Description

Job Summary

As a Windows Vulnerability Researcher at Booz Allen Hamilton, you will deliver production-grade offensive capabilities and expert insights into vulnerability research and exploit development within the Windows ecosystem. Your work will directly support strategic intelligence collection and cyber effects missions by discovering, weaponizing, and operationalizing previously unknown vulnerabilities.

Key Responsibilities

  • Perform advanced vulnerability research across Windows kernel, user-mode components, Hyper-V, and hardware-assisted security features.
  • Develop reliable exploits targeting user applications, system services, kernel drivers, virtualization layers, and firmware subsystems.
  • Engineer persistent CNO implants and infrastructure using C/C++, Python, and Windows APIs.
  • Reverse engineer closed-source binaries and system components at scale.
  • Bypass modern mitigations such as ASLR, CFG, CET, HVCI, kernel patch protection, driver signature enforcement, and application sandboxing.
  • Author comprehensive technical documentation for delivery and sustainment.
  • Contribute to capability roadmaps and emerging tradecraft development.
  • Utilize AI and LLM-powered tooling to accelerate vulnerability discovery and exploit implementation.

Basic Qualifications

  • 3+ years of experience in vulnerability research, reverse engineering, or exploit development.
  • Proficiency using C or C++, Python, and Windows APIs.
  • Experience with analysis tools like IDA Pro, Ghidra, Binary Ninja, WinDbg, x64dbg, or ProcDump.
  • Demonstrated experience with vulnerability discovery and weaponization.
  • Proven ability to defeat kernel hardening, sandboxing, and attestation mechanisms.
  • Experience with GitLab CI/CD for implant build pipelines.
  • TS/SCI clearance with a polygraph.
  • HS diploma or GED.

Additional Qualifications

  • Experience publishing research or tools recognized within the offensive security community.
  • Operational support experience for IC or DoD cyber mission forces.
  • Contribution to Windows exploit frameworks or public CVE discoveries.
  • Strong knowledge of x86-64 architecture and assembly.
  • Ability to achieve code execution in ring-0 and hypervisor contexts.

Compensation and Benefits

Booz Allen Hamilton offers a comprehensive total compensation package, including health, life, disability, financial, and retirement benefits. Employees also receive paid leave, professional development, tuition assistance, and work-life programs. Salary is determined by various factors, including location, education, knowledge, skills, competencies, and experience. The projected compensation range for this position is $86,900.00 to $198,000.00 (annualized USD).

Work Model

Booz Allen Hamilton embraces a people-first culture prioritizing flexibility and collaboration. This position likely supports a hybrid work model, requiring periodic work from a Booz Allen or client site facility.

Key skills/competency

  • Vulnerability Research
  • Exploit Development
  • Reverse Engineering
  • Windows Kernel
  • Cyber Operations
  • C/C++ & Python
  • Mitigation Bypass
  • Disassemblers/Debuggers (IDA Pro, Ghidra)
  • CI/CD Pipelines
  • x86-64 Assembly

Tags:

Windows Vulnerability Researcher
vulnerability research
exploit development
reverse engineering
cyber operations
CNO
mitigation bypass
documentation
AI/LLM
C
C++
Python
Windows APIs
IDA Pro
Ghidra
WinDbg
GitLab CI/CD
x86-64
Hyper-V

Share Job:

How to Get Hired at Booz Allen Hamilton

  • Research Booz Allen Hamilton's culture: Study their mission, values, recent news, and employee testimonials on LinkedIn and Glassdoor, focusing on their commitment to national security and innovation.
  • Tailor your resume for Windows Vulnerability Researcher: Highlight specific experience in vulnerability research, exploit development, reverse engineering, and hands-on work with Windows internals and security mitigations.
  • Showcase technical prowess: Prepare to discuss your experience with tools like IDA Pro, Ghidra, WinDbg, and your proficiency in C/C++, Python. Be ready to detail past vulnerability discoveries or mitigation bypass techniques.
  • Understand security clearance requirements: Emphasize your TS/SCI clearance with polygraph readiness. Be prepared for rigorous background checks and interviews that delve into sensitive information.
  • Demonstrate problem-solving and critical thinking: Practice articulating how you approach complex technical challenges, especially in identifying and exploiting vulnerabilities within highly secure environments.

Frequently Asked Questions

Find answers to common questions about this job opportunity

Explore similar opportunities that match your background