This position requires visionary approach to research with a keen ability to anticipate emerging cyber challenges and pioneer innovative solutions, and a deep understanding of cyber threat landscapes, exploit development, reverse engineering, mission-oriented software tooling, and adversarial tactics to drive cutting-edge research and prototype novel solutions. Demonstrated expertise in identifying, analyzing, and exploiting complex vulnerabilities (including memory corruption, privilege escalation, sandbox escapes) across multiple platforms, architectures (e.g., x86, ARM, MIPS, RISC-V, microcontrollers), and environments (modern OSes, embedded systems).