Reveal Technology is a dynamic startup revolutionizing field operations by delivering software tools and intelligence to operators in extreme environments. The Senior Cybersecurity / Exploitation Engineer will build exploitation and vulnerability intelligence systems for the Cyber Platform, focusing on offensive security capabilities, including penetration testing and exploit development.
Responsibilities:
- Build cutting-edge offensive security systems from the ground up, working with exploitation frameworks, vulnerability intelligence, and security assessment tools
- Develop automation, building security infrastructure, and creating systems that push the boundaries of what's possible in offensive security
- Work across the full stack—from low-level exploit development to high-level system integration—building tools and platforms that security professionals will use in the field
- Expect to solve hard problems, work with cutting-edge technology, and see your code deployed where it matters
Requirements:
- Hands-on experience in penetration testing, exploit development, or offensive security
- Strong proficiency in Python for exploit development and automation
- Strong proficiency network protocols (TCP/IP, HTTP, SSH, Telnet, etc.)
- Strong proficiency exploitation frameworks (Metasploit or similar)
- Strong proficiency vulnerability research and CVE analysis
- Experience with device fingerprinting and reconnaissance techniques
- Experience with network security assessment and penetration testing
- Experience with vulnerability databases and intelligence feeds
- Understanding of common device vulnerabilities (routers, IoT, embedded systems)
- Experience with embedded device security or IoT exploitation
- Comfortable working in Linux environments and command-line tools
- Knowledge of wireless protocol security
- Experience with sandbox/emulation environments (QEMU, Docker, etc.)
- Familiarity with CVE databases and vulnerability intelligence
- Prior work in red team, penetration testing, or offensive security roles
- Experience with post-exploitation frameworks and session management
- Background supporting defense or Intelligence Community programs
- Security clearance or ability to obtain
- Contributions to open-source security tools or exploit frameworks