Dear applicants, please keep in mind that applications without provided salary expectations and active LN profile will not be considered.
Hope for your understanding.
Location: Washington, D.C.
Employment Type: Full-Time (In-person, 5 days/week)
Visa: Not available
Clearance Eligibility: Required
Experience: 5 years
We are hiring AI / Systems Engineers to build production systems that automate vulnerability research and exploit development. This is not a prompt engineering role. This is low-level, performance-critical, close-to-the-metal engineering.
Two adjacent profiles fit:
Vulnerability researchers with deep systems knowledge
Low-level systems engineers with strong builder instincts
The non-negotiable: OS-level fluency.
About the Company
A seed-stage AI-native offensive cybersecurity company building automated systems for Cyber Network Operations for the U.S. and allied governments. High-seven-figure live government contract. Backed by Tier 1 defense and cyber investors. 15-person elite technical team with Engineers from top AI and systems companies. Their Mission: AI-driven cyber dominance. The company operates at the intersection of Low-level systems engineering, Offensive security, AI-driven vulnerability research and Production-grade exploit development.
What You’ll Own
- AI-driven vulnerability research systems
- Kernel-level and OS-level system interactions
- Runtime detection and dynamic analysis tooling
- Performance-critical exploit infrastructure
- End-to-end system ownership (architecture → implementation → production)
- Translating manual cyber workflows into automated systems
Must-Have Requirements
- 5+ years engineering experience (exceptional new grads considered)
- Deep low-level systems knowledge (OS internals, kernel, runtime tooling)
- Builder mindset with shipped production code
- Comfort with ambiguity and uncertainty
- In-person in Washington, D.C.
- Eligible for U.S. security clearance
Nice to Have
- CTF / vulnerability research background
- Offensive security experience
- YC / top AI startup engineering experience
- OS-level open-source contributions
- Runtime detection / dynamic analysis tooling
- ML/AI systems exposure