
Senior Reverse Engineer
Motion Recruitment Partners LLC, Arlington, VA, United States
A leading embedded security research firm is hiring a Senior Reverse Engineer to lead vulnerability research and exploitation efforts across embedded hardware and firmware systems. This role supports high-impact work across defense and critical infrastructure.
Location
Hybrid in Northern Virginia, Washington DC, or Maryland
Responsibilities
Lead reverse engineering of embedded systems across hardware and firmware
Identify and exploit vulnerabilities using static, dynamic, and side channel techniques
Develop proof-of-concept exploits including secure boot bypass and privilege escalation
Build tools and automation for firmware analysis and vulnerability discovery
Contribute to internal security platforms and mentor junior engineers
Requirements
5+ years in reverse engineering or low-level vulnerability research
Strong experience with C or C++ and Python
Proficiency in assembly for at least one architecture
Experience with tools like IDA, Ghidra, or Binary Ninja
Active clearance or ability to obtain a U.S. security clearance
Preferred
Experience with fuzzing or side channel attacks
Familiarity with ARM, AARCH64, MIPS, or PPC
Background in government-funded research or advanced degree
#J-18808-Ljbffr
Location
Hybrid in Northern Virginia, Washington DC, or Maryland
Responsibilities
Lead reverse engineering of embedded systems across hardware and firmware
Identify and exploit vulnerabilities using static, dynamic, and side channel techniques
Develop proof-of-concept exploits including secure boot bypass and privilege escalation
Build tools and automation for firmware analysis and vulnerability discovery
Contribute to internal security platforms and mentor junior engineers
Requirements
5+ years in reverse engineering or low-level vulnerability research
Strong experience with C or C++ and Python
Proficiency in assembly for at least one architecture
Experience with tools like IDA, Ghidra, or Binary Ninja
Active clearance or ability to obtain a U.S. security clearance
Preferred
Experience with fuzzing or side channel attacks
Familiarity with ARM, AARCH64, MIPS, or PPC
Background in government-funded research or advanced degree
#J-18808-Ljbffr