Qureos

FIND_THE_RIGHTJOB.

Sr. Security Vulnerability Researcher

JOB_REQUIREMENTS

Hires in

Not specified

Employment Type

Not specified

Company Location

Not specified

Salary

Not specified

NexTech Solutions (NTS) is a team of experts and engineers who understand the challenges that organizations face in finding and implementing the best technologies and IT solutions to meet mission requirements. We work with our government customers in defense and civilian agencies to identify new technologies.


The Opportunity
The Senior Security Vulnerability Researcher-Cyber Engineer 4 will provide advanced technical expertise in assessing and improving the security posture of publicly and commercially available data, platforms, and software in support of a U.S. Government cybersecurity mission.
This role involves leading complex vulnerability research initiatives, identifying emerging threats, evaluating system weaknesses, and delivering high-impact recommendations to enhance resilience across government and partner systems. The successful candidate will serve as a technical authority, mentor junior researchers, and contribute directly to strategic vulnerability management and threat intelligence initiatives.


Key Responsibilities
  • Lead advanced research and analysis on vulnerabilities within publicly accessible and commercial data sources, platforms, and software relevant to government missions.
  • Direct and perform in-depth vulnerability assessments, exploit validation, and security posture evaluations.
  • Develop and oversee methodologies for identifying, categorizing, and prioritizing vulnerabilities using both automated and manual analysis techniques.
  • Collaborate with internal and external stakeholders to develop mitigation strategies and enhance vulnerability management processes.
  • Produce detailed technical reports, threat assessments, and briefings tailored for both technical and executive audiences.
  • Track global vulnerability disclosures, emerging exploitation trends, and adversary tactics to inform proactive defense measures.
  • Apply expertise in reverse engineering, static and dynamic analysis, and protocol dissection to validate findings.
  • Guide junior analysts and researchers in vulnerability discovery, tool development, and analytic tradecraft.
  • Represent the research team in interagency or partner technical forums, ensuring alignment with government cybersecurity objectives.

Leadership Responsibilities

  • This position may potentially serve as the lead and primary point of contact for a team.
  • Fluency in English (written and spoken)
  • U.S. citizenship and ability to obtain and maintain a TS/SCI security clearance with the US Government.

Education
  • Bachelor’s degree in Computer Science, Cybersecurity, Information Security, or a related technical field Masters degree preferred).
Required Skills, Experience & Abilities
  • Minimum of 9 years of professional experience in vulnerability research, penetration testing, exploit development, or cyber threat intelligence.
  • Proven experience supporting U.S. Government cybersecurity, defense, or intelligence programs.
  • Deep technical understanding of operating systems, network protocols, cloud architectures, and application security.
  • Proficiency with vulnerability analysis and exploitation frameworks (e.g., IDA Pro, Ghidra, Burp Suite, Metasploit, Nessus, Nmap).
  • Strong command of programming and scripting languages (e.g., Python, C/C++, PowerShell, Bash).
  • Familiarity with CVE/CVSS scoring, MITRE ATT&CK, and vulnerability disclosure standards.
  • Demonstrated ability to synthesize complex technical data into clear, actionable intelligence products.

Preferred Qualifications
  • Advanced degree (M.S. or Ph.D.) in Cybersecurity, Computer Engineering, or related field.
  • Recognized industry certifications such as OSCP, OSCE, GREM, GXPN, CISSP, or GIAC GCTI.
  • Experience developing or customizing tools for vulnerability discovery, data analysis, or threat emulation.
  • Familiarity with secure software development practices, data protection, and privacy compliance requirements.
  • Experience mentoring, leading small research teams, or managing cybersecurity projects.

Physical Demands & Work Environment
The physical demands and work environment described are representative of those that an employee encounters while performing the essential functions of this job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
  • Prolonged periods of sitting at a desk and working on a computer.
  • Ability to sit or stand for long periods of time
  • Fast-paced, mission-driven environment supporting sensitive government cybersecurity initiatives.
  • Requires exceptional analytical, problem-solving, and communication skills.
  • May involve occasional travel to secure facilities or client sites.

  • Standard work schedule is Mon-Fri with core hours from 7am-5pm EST
  • 8 hour work day with flexibility within the core hours of operation.

Equal Opportunity

All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. NTS will also consider qualified applicants with criminal histories consistent with relevant laws for employment.

For individuals with disabilities that need additional assistance at any point in the application and interview process, please email recruiting@nextechsol.com

© 2025 Qureos. All rights reserved.