VetRamp, in partnership with Providence Partners, is supporting a highly respected cybersecurity organization in the search for multiple Senior Vulnerability Researchers (REMOTE) to join an elite technical research team operating at the center of the global vulnerability intelligence ecosystem.
This opportunity sits within a long-established, industry-recognized program that works directly with leading researchers worldwide to evaluate cutting-edge vulnerability submissions, assess exploitability, and help convert research into real-world protection for enterprise customers.
The company name and team details will be shared during an initial confidential conversation with qualified and interested candidates.
This is an exceptional opportunity for someone who enjoys breaking things, understanding how they work, and deciding what truly matters.
What You’ll Do
- Evaluate vulnerability submissions from researchers worldwide for technical validity, exploitability, and impact
- Analyze proof-of-concepts, exploit chains, and partial exploit primitives
- Perform reverse engineering across software, binaries, protocols, and operating systems
- Determine severity, uniqueness, and real-world defensive value of vulnerabilities
- Partner internally with product and research teams to convert findings into detection and protection capabilities
- Contribute blogs, white papers, and technical thought leadership
- Collaborate with globally distributed researchers in an async, remote-first environment
What Makes You a Strong Fit
You likely bring one deep technical specialty plus broader adjacent expertise.
Examples include:
- Windows internals / exploit research
- Linux or kernel security
- Web application security / browser exploitation
- Hypervisor / virtualization security
- Embedded / hardware security
- Protocol research / network exploitation
Required Technical Skills
- Strong vulnerability analysis skills
- Experience with reverse engineering (static + dynamic)
- Ability to assess exploit chains and attack methods
- Familiarity with tools such as IDA Pro, Ghidra, Binary Ninja, WinDbg, gdb, LLDB, Wireshark
- Coding ability in at least two of: C/C++, Python, Java, Assembly, .NET
- Understanding of mitigations such as DEP, ASLR, sandboxing, and isolation models
- Strong written communication for technical reporting
Strong Signals of Fit
- Prior vulnerability research experience
- Bug bounty / Pwn2Own participation
- Public CVEs / advisories
- Reverse engineering background
- Offensive security research
- Product security engineering
- Reputation within the security community
Why This Role Is Different
- Join a globally recognized technical research environment
- Access a constant stream of cutting-edge vulnerability intelligence
- Remote-first culture with strong technical leadership
- Real-world impact protecting enterprises worldwide
Compensation
Generally aligned in the $150K–$200K+ USD range (but flexible for the right candidate) depending on location and expertise.
Interested?
If this aligns with your background, we’d welcome a confidential conversation to share the company, team structure, and why this has become a priority search.