Vulnerability Research Intern

Posted:
9/30/2024, 4:43:38 AM

Location(s):
Virginia, United States

Experience Level(s):
Internship

Field(s):
Software Engineering

Workplace Type:
On-site

At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future.

Overview of Opportunity 

Join our Electronic Systems team, where we focus on forward & reverse engineering, vulnerability & malware research, and cryptographic protocols. We are seeking several interns for this 10-week internship program, which will be conducted onsite in Arlington, VA.

Key Responsibilities:

  • Collaborate on advanced research and innovative projects in cybersecurity and vulnerability discovery.
  • Apply knowledge of Linux/Unix systems to solve mission-critical challenges.
  • Develop scalable, deployable systems that address real-world security problems.
  • Assist with reverse engineering, debugging, and analyzing complex mission applications.
  • Present an end-of-internship project that highlights your contributions.

Minimum Qualifications:

  • Currently pursuing a degree in Computer Science, Computer Engineering, Electrical Engineering, Mathematics, Statistics, or a related field.
  • Rising Juniors or Seniors are strongly preferred.
  • US Citizenship is required due to the nature of our work.
  • Ability to work onsite at our Arlington, VA office 3-5 days a week.

Skills & Experience (Preferred Exposure to One or More of the Following):

  • Mobile and embedded system development or architecture (e.g., Android, ARM, wireless protocols).
  • Unix/Linux kernel internals: understanding access controls, file systems, object file formats, runtime linker/loader, process/thread APIs, and data structures.
  • Program analysis, reverse engineering, vulnerability research, or cryptographic protocols.
  • Proficiency in assembly languages (x86, ARM, MIPS, PowerPC).
  • Foundational knowledge of networking protocols, operating systems, or kernels, and network sockets programming.
  • Hands-on hacking experience (memory corruption, rootkits, MetaSploit, Nmap).
  • Dynamic signal capture for protocols like SPI, UART, CAN, I2C.
  • Agile development experience or comfort with CI/CD practices, including testing and releasing software.
  • Experience in C, C++, and Python for tool development.
  • Knowledge of memory protection techniques (ASLR, DEP).
  • Experience tracing code execution in a debugger (WinDbg/gdb/IDA Pro).

Clearance Requirements:

  • Must have eligibility to obtain a U.S. security clearance