Mediabistro logo
job logo

Security Researcher (Mobile focused)

KamisPro, Springfield, VA, United States


We are seeking a highly skilled

Mobile Vulnerability Researcher / Exploitation Engineer

to support mission‑critical initiatives for our law enforcement and intelligence partners.
This is a long‑term contract (with benefits) that is hybrid to Springfield, VA. An active Top‑Secret (TS) with SCI eligibility is required.
This role sits within a fast‑paced R&D environment focused on discovering, analyzing, and operationalizing vulnerabilities in mobile platforms. You will work on cutting‑edge challenges involving mobile operating systems, applications, and low‑level system behavior to develop advanced exploitation capabilities.
What You’ll Do

Conduct offensive cyber operations (CNE) focused on mobile devices and applications
Research and develop exploitation techniques across

iOS, Android, and macOS

platforms
Identify and analyze vulnerabilities to enable access to target systems
Perform deep reverse engineering of mobile applications, firmware, and OS components
Analyze closed‑source software using industry‑standard tooling
Collaborate with cross‑functional teams to prototype and deploy advanced capabilities
What You Bring

3+ years of experience in offensive cybersecurity (CNE/CNO or similar)
Strong experience assessing the security of

iOS, macOS, and/or Android

environments
Hands‑on expertise with reverse engineering tools such as

IDA Pro, Ghidra, JEB, or Hopper
Proficiency in one or more programming languages:

C, C++, Python, Swift, Rust, or Assembly
Demonstrated experience exploiting mobile devices, applications, or operating systems
Active

Top‑Secret clearance

with willingness to obtain

SCI and CI Polygraph
Nice to Have

Experience with kernel‑level exploitation or sandbox escapes
Familiarity with mobile security mitigations (ASLR, DEP, sandboxing)
Background supporting intelligence or law enforcement missions
Contributions to security research, CVEs, or public tooling
Why Join Us

Access to cutting‑edge tools and research environments
Collaborate with elite engineers and researchers in offensive cyber
Direct contribution to national security missions

#J-18808-Ljbffr