1 day ago

Security Vulnerability Researcher

Jobs via Dice

Hybrid
Temporary
$215,000
Hybrid

Job Overview

Job TitleSecurity Vulnerability Researcher
Job TypeTemporary
CategoryCommerce
Experience5 Years
DegreeMaster
Offered Salary$215,000
LocationHybrid

Who's the hiring manager?

Sign up to PitchMeAI to discover the hiring manager's details for this job. We will also write them an intro email for you.

Uncover Hiring Manager

Job Description

About Request Technology, LLC

Request Technology, LLC, featured on Dice, is actively seeking a Security Vulnerability Researcher. This role offers the opportunity to be at the forefront of cybersecurity innovation, identifying critical weaknesses in various systems.

The Role: Security Vulnerability Researcher

As a Security Vulnerability Researcher, you will be pivotal in proactively discovering impactful, unknown vulnerabilities and security weaknesses across systems, software, architectures, and strategies. A significant focus of this role involves analyzing AI/ML systems and AI-enabled technologies to identify exploitation opportunities and inform robust mitigation strategies and secure design principles.

Key Responsibilities

  • Conduct annual source code reviews and binary analysis.
  • Perform vulnerability assessments, dynamic testing, and threat modeling.
  • Execute security architecture reviews for web applications, APIs, and cloud infrastructure (Azure).
  • Ensure Azure Cloud security configuration and conduct red teaming and penetration testing.
  • Develop and provide working exploits (CVEs).
  • Implement automation for security analysis, utilizing tools like AFL and Peach.
  • Apply expertise in Python, Java, C#, and PowerShell for security tooling.
  • Adhere to security guidelines such as OWASP, NIST 800, and MITRE ATT&CK frameworks.
  • Analyze buffer overflows and machine architecture for exploitation.
  • Engage in purple team exercises and research AI vulnerability technologies.

Qualifications

  • 7+ years of professional experience in the cybersecurity industry or equivalent work experience.
  • Comprehensive understanding of adversary emulation operations, including reconnaissance, social engineering, exploitation, post-exploitation, lateral movement, and data exfiltration.
  • Extensive experience in offensive cybersecurity roles: red teaming, penetration testing (web, infrastructure, cloud), and purple team exercises across cloud and on-prem environments.
  • Robust understanding of contemporary security theory, application exploitation techniques, and attack vectors, including vulnerability lifecycle and scanning methodologies (SAST, DAST, IAST, RASP).
  • Experience in developing and managing testing methodologies compliant with OWASP, NIST 800, or MITRE ATT&CK.
  • Solid understanding of computer architecture for binary analysis and exploitation.
  • Ability to analyze, create, and debug shellcode and low-level exploits.
  • Experience developing custom security software (offensive or defensive) in compiled languages.
  • Demonstrated ability to reverse engineer binaries, enumerate vulnerabilities, and provide working exploits (e.g., CVEs).
  • Familiarity with automated security analysis and fuzzing tools (AFL, Peach).
  • Demonstrated ability to discover vulnerabilities via static analysis and source code review.
  • Working understanding of key programming languages (Java, Node.js, Python, JSP) and ability to quickly learn new languages and their security implications.
  • Proficiency in scripting/programming with Python, PowerShell, or C# to create and customize tools.

Key skills/competency

  • Vulnerability Research
  • Offensive Security
  • Penetration Testing
  • Red Teaming
  • Cloud Security
  • Binary Analysis
  • Reverse Engineering
  • Exploit Development
  • AI/ML Security
  • Static/Dynamic Analysis

Tags:

Security Vulnerability Researcher
Vulnerability assessment
Red teaming
Penetration testing
Exploit development
Reverse engineering
Binary analysis
Source code review
Cloud security
Threat modeling
AI/ML security
Python
Java
C#
PowerShell
OWASP
NIST 800
MITRE ATT&CK
AFL
Peach
Azure
Node.js
JSP

Share Job:

How to Get Hired at Jobs via Dice

  • Research Request Technology, LLC's mission: Understand their cybersecurity focus, client base, and contribution to the tech industry by exploring their website and professional profiles.
  • Tailor your resume for vulnerability research: Highlight extensive experience in offensive security, binary analysis, exploit development, and AI/ML system security, using keywords from the Security Vulnerability Researcher description.
  • Showcase practical exploit development: Prepare a portfolio or demonstrate past CVEs, public acknowledgements, or working exploits to validate your hands-on vulnerability discovery skills.
  • Master offensive security techniques: Deepen your knowledge of adversary emulation, red teaming, cloud security, and contemporary attack vectors for the Security Vulnerability Researcher role.
  • Prepare for technical deep dives: Be ready to discuss specific experiences with source code review, reverse engineering, fuzzing tools like AFL/Peach, and scripting in Python, PowerShell, or C#.

Frequently Asked Questions

Find answers to common questions about this job opportunity

Explore similar opportunities that match your background