*This position does not offer work visa sponsorship*
The Vulnerability Researcher is responsible for analyzing systems, software, architectures, and strategies to discover impactful, unknown vulnerabilities and security weaknesses, including those affecting AI/ML systems and AI-enabled technologies and services. This work proactively identifies classes of vulnerabilities and exploitation opportunities that inform mitigation strategies and secure design.
The role involves performing manual source code review, binary analysis, vulnerability assessments, dynamic testing, threat modeling, and security architecture review. The researcher conducts ongoing analysis of real-world adversaries, exploitation methods, and emerging attack surface and offensive security techniques to guide research priorities. Development of custom tooling and automation is required to augment manual vulnerability discovery.
Responsibilities- Conducts research to identify highly impactful, unknown vulnerabilities in a wide variety of applications and technologies, including AI-enabled applications and services
- Performs vulnerability assessments using industry best practices on various environments, including web applications, APIs, and cloud infrastructure
- Develops and manages testing methodologies that adhere to common security guidelines and NIST standards
- Conducts an evaluation of cloud security configurations, identifies prevalent vulnerabilities in cloud security controls, and improves and maintains cloud testing standards
- Provides detailed reports with proof of vulnerabilities, guidance, and advice to support customer teams through vulnerability remediation
- Develops and communicates comprehensive and accurate reports and presentations for client stakeholders including technical staff and executive leadership
- Maintains communication with management regarding development within assigned responsibilities and performs special projects as required
- Researches and develops innovative techniques, tools, and methodologies for vulnerability research and red team activities
- Develops leadership-level communications, including management-specific metrics, white papers, procedures, thought position papers, etc.
- This list is not all-inclusive, and you are expected to perform other cybersecurity-congruent duties as requested or assigned
- 7+ years of professional work experience in the cybersecurity industry with Bachelor’s degree in Computer Science, Management Information Systems, or a related field, or equivalent work experience.
- Understanding of all phases of adversary emulation operations, including reconnaissance, social engineering, exploitation, post-exploitation, covert techniques, lateral movement, and data exfiltration.
- Extensive experience in offensive cybersecurity roles, such as red teaming, penetration testing (e.g., web, infrastructure, cloud), and purple team exercises across cloud and on-prem environments.
- Robust understanding of contemporary security theory, application exploitation techniques, and attack vectors, including the vulnerability lifecycle and scanning methodologies (SAST, DAST, IAST, RASP).
- Experience developing and managing testing methodologies that adhere to common security guidelines such as OWASP and frameworks such as NIST 800 or MITRE ATT&CK.
- Solid understanding of computer architecture and organization with respect to binary analysis and exploitation.
- Ability to analyze, create, and debug shellcode and other low-level exploits.
- Experience developing custom security software (offensive or defensive) in one or more compiled languages.
- Demonstrated ability to reverse engineer binaries, enumerate vulnerabilities in compiled software, and provide working exploits (e.g., CVEs, public acknowledgements, or the ability to demonstrate on demand).
- Familiarity with automated security analysis and fuzzing tools (e.g., AFL and Peach).
- Demonstrated ability to discover vulnerabilities via static analysis and source code review.
- Working understanding of key programming languages and frameworks (e.g., Java, Node.js, Python, JSP), including the ability to quickly learn new languages, understand their security implications, and enumerate vulnerabilities in custom-developed software packages.
- Familiarity with scripting and programming in Python, PowerShell, or C#, with the ability to create and customize tools.
- Excellent written and verbal communication skills, including technical writing, documentation development, process mapping, and visualization.
- Ability to communicate technical concepts effectively to both technical and non-technical audiences across various roles and levels.
- Strong analytical and problem-solving skills, with the ability to examine issues strategically and analytically.
- Ability to interact effectively with co-workers and external contacts and work collaboratively in a team environment.
- Ability to manage multiple simultaneous initiatives and prioritize workload to meet commitments.
- Self-motivated with a strong sense of urgency, an adaptive mindset, and a demonstrated ability to learn quickly.
Base Pay Information
The national base pay range at the end is a good-faith estimate of what Delta Dental may pay for new hires. Actual pay may vary based on Delta Dental’s assessment of the candidate’s knowledge, skills, abilities (KSAs), related experience, education, certifications, and ability to meet required minimum job qualifications. Other factors impacting pay include prevailing wages in the work location and internal equity.
Pay Grade 25. $142,107 - $308,050
- Competitive base and incentive pay
- 401(k) with robust matching and non-matching contributions
- Rich medical & pharmacy benefits
- 100% employer-paid dental and vision benefits
- Holistic wellbeing program with deep financial incentives
- Generous paid time off plus 12 paid holidays and your birthday off
- Culture of growth and learning: career development; tuition reimbursement; recognition program
- Family support: adoption assistance, fertility treatment, child, elder & pet care assistance
- Social responsibility and volunteer opportunities
- Employee discount program
Top Skills
Similar Jobs
What you need to know about the Colorado Tech Scene
Key Facts About Colorado Tech
- Number of Tech Workers: 260,000; 8.5% of overall workforce (2024 CompTIA survey)
- Major Tech Employers: Lockheed Martin, Century Link, Comcast, BAE Systems, Level 3
- Key Industries: Software, artificial intelligence, aerospace, e-commerce, fintech, healthtech
- Funding Landscape: $4.9 billion in VC funding in 2024 (Pitchbook)
- Notable Investors: Access Venture Partners, Ridgeline Ventures, Techstars, Blackhorn Ventures
- Research Centers and Universities: Colorado School of Mines, University of Colorado Boulder, University of Denver, Colorado State University, Mesa Laboratory, Space Science Institute, National Center for Atmospheric Research, National Renewable Energy Laboratory, Gottlieb Institute
.png)


