Security Vulnerability Researcher
Jobs via Dice
Job Overview
Who's the hiring manager?
Sign up to PitchMeAI to discover the hiring manager's details for this job. We will also write them an intro email for you.

Job Description
About Request Technology, LLC
Request Technology, LLC, featured on Dice, is actively seeking a Security Vulnerability Researcher. This role offers the opportunity to be at the forefront of cybersecurity innovation, identifying critical weaknesses in various systems.
The Role: Security Vulnerability Researcher
As a Security Vulnerability Researcher, you will be pivotal in proactively discovering impactful, unknown vulnerabilities and security weaknesses across systems, software, architectures, and strategies. A significant focus of this role involves analyzing AI/ML systems and AI-enabled technologies to identify exploitation opportunities and inform robust mitigation strategies and secure design principles.
Key Responsibilities
- Conduct annual source code reviews and binary analysis.
- Perform vulnerability assessments, dynamic testing, and threat modeling.
- Execute security architecture reviews for web applications, APIs, and cloud infrastructure (Azure).
- Ensure Azure Cloud security configuration and conduct red teaming and penetration testing.
- Develop and provide working exploits (CVEs).
- Implement automation for security analysis, utilizing tools like AFL and Peach.
- Apply expertise in Python, Java, C#, and PowerShell for security tooling.
- Adhere to security guidelines such as OWASP, NIST 800, and MITRE ATT&CK frameworks.
- Analyze buffer overflows and machine architecture for exploitation.
- Engage in purple team exercises and research AI vulnerability technologies.
Qualifications
- 7+ years of professional experience in the cybersecurity industry or equivalent work experience.
- Comprehensive understanding of adversary emulation operations, including reconnaissance, social engineering, exploitation, post-exploitation, lateral movement, and data exfiltration.
- Extensive experience in offensive cybersecurity roles: red teaming, penetration testing (web, infrastructure, cloud), and purple team exercises across cloud and on-prem environments.
- Robust understanding of contemporary security theory, application exploitation techniques, and attack vectors, including vulnerability lifecycle and scanning methodologies (SAST, DAST, IAST, RASP).
- Experience in developing and managing testing methodologies compliant with OWASP, NIST 800, or MITRE ATT&CK.
- Solid understanding of computer architecture for binary analysis and exploitation.
- Ability to analyze, create, and debug shellcode and low-level exploits.
- Experience developing custom security software (offensive or defensive) in compiled languages.
- Demonstrated ability to reverse engineer binaries, enumerate vulnerabilities, and provide working exploits (e.g., CVEs).
- Familiarity with automated security analysis and fuzzing tools (AFL, Peach).
- Demonstrated ability to discover vulnerabilities via static analysis and source code review.
- Working understanding of key programming languages (Java, Node.js, Python, JSP) and ability to quickly learn new languages and their security implications.
- Proficiency in scripting/programming with Python, PowerShell, or C# to create and customize tools.
Key skills/competency
- Vulnerability Research
- Offensive Security
- Penetration Testing
- Red Teaming
- Cloud Security
- Binary Analysis
- Reverse Engineering
- Exploit Development
- AI/ML Security
- Static/Dynamic Analysis
How to Get Hired at Jobs via Dice
- Research Request Technology, LLC's mission: Understand their cybersecurity focus, client base, and contribution to the tech industry by exploring their website and professional profiles.
- Tailor your resume for vulnerability research: Highlight extensive experience in offensive security, binary analysis, exploit development, and AI/ML system security, using keywords from the Security Vulnerability Researcher description.
- Showcase practical exploit development: Prepare a portfolio or demonstrate past CVEs, public acknowledgements, or working exploits to validate your hands-on vulnerability discovery skills.
- Master offensive security techniques: Deepen your knowledge of adversary emulation, red teaming, cloud security, and contemporary attack vectors for the Security Vulnerability Researcher role.
- Prepare for technical deep dives: Be ready to discuss specific experiences with source code review, reverse engineering, fuzzing tools like AFL/Peach, and scripting in Python, PowerShell, or C#.
Frequently Asked Questions
Find answers to common questions about this job opportunity
Explore similar opportunities that match your background