Windows Vulnerability Researcher
Booz Allen Hamilton
Job Overview
Who's the hiring manager?
Sign up to PitchMeAI to discover the hiring manager's details for this job. We will also write them an intro email for you.

Job Description
Job Summary
As a Windows Vulnerability Researcher at Booz Allen Hamilton, you will deliver production-grade offensive capabilities and expert insights into vulnerability research and exploit development within the Windows ecosystem. Your work will directly support strategic intelligence collection and cyber effects missions by discovering, weaponizing, and operationalizing previously unknown vulnerabilities.
Key Responsibilities
- Perform advanced vulnerability research across Windows kernel, user-mode components, Hyper-V, and hardware-assisted security features.
- Develop reliable exploits targeting user applications, system services, kernel drivers, virtualization layers, and firmware subsystems.
- Engineer persistent CNO implants and infrastructure using C/C++, Python, and Windows APIs.
- Reverse engineer closed-source binaries and system components at scale.
- Bypass modern mitigations such as ASLR, CFG, CET, HVCI, kernel patch protection, driver signature enforcement, and application sandboxing.
- Author comprehensive technical documentation for delivery and sustainment.
- Contribute to capability roadmaps and emerging tradecraft development.
- Utilize AI and LLM-powered tooling to accelerate vulnerability discovery and exploit implementation.
Basic Qualifications
- 3+ years of experience in vulnerability research, reverse engineering, or exploit development.
- Proficiency using C or C++, Python, and Windows APIs.
- Experience with analysis tools like IDA Pro, Ghidra, Binary Ninja, WinDbg, x64dbg, or ProcDump.
- Demonstrated experience with vulnerability discovery and weaponization.
- Proven ability to defeat kernel hardening, sandboxing, and attestation mechanisms.
- Experience with GitLab CI/CD for implant build pipelines.
- TS/SCI clearance with a polygraph.
- HS diploma or GED.
Additional Qualifications
- Experience publishing research or tools recognized within the offensive security community.
- Operational support experience for IC or DoD cyber mission forces.
- Contribution to Windows exploit frameworks or public CVE discoveries.
- Strong knowledge of x86-64 architecture and assembly.
- Ability to achieve code execution in ring-0 and hypervisor contexts.
Compensation and Benefits
Booz Allen Hamilton offers a comprehensive total compensation package, including health, life, disability, financial, and retirement benefits. Employees also receive paid leave, professional development, tuition assistance, and work-life programs. Salary is determined by various factors, including location, education, knowledge, skills, competencies, and experience. The projected compensation range for this position is $86,900.00 to $198,000.00 (annualized USD).
Work Model
Booz Allen Hamilton embraces a people-first culture prioritizing flexibility and collaboration. This position likely supports a hybrid work model, requiring periodic work from a Booz Allen or client site facility.
Key skills/competency
- Vulnerability Research
- Exploit Development
- Reverse Engineering
- Windows Kernel
- Cyber Operations
- C/C++ & Python
- Mitigation Bypass
- Disassemblers/Debuggers (IDA Pro, Ghidra)
- CI/CD Pipelines
- x86-64 Assembly
How to Get Hired at Booz Allen Hamilton
- Research Booz Allen Hamilton's culture: Study their mission, values, recent news, and employee testimonials on LinkedIn and Glassdoor, focusing on their commitment to national security and innovation.
- Tailor your resume for Windows Vulnerability Researcher: Highlight specific experience in vulnerability research, exploit development, reverse engineering, and hands-on work with Windows internals and security mitigations.
- Showcase technical prowess: Prepare to discuss your experience with tools like IDA Pro, Ghidra, WinDbg, and your proficiency in C/C++, Python. Be ready to detail past vulnerability discoveries or mitigation bypass techniques.
- Understand security clearance requirements: Emphasize your TS/SCI clearance with polygraph readiness. Be prepared for rigorous background checks and interviews that delve into sensitive information.
- Demonstrate problem-solving and critical thinking: Practice articulating how you approach complex technical challenges, especially in identifying and exploiting vulnerabilities within highly secure environments.
Frequently Asked Questions
Find answers to common questions about this job opportunity
Explore similar opportunities that match your background