The company is looking to solve complex security challenges in wireless communication systems and mobile platforms.
Requirements
- Proficiency in reverse engineering tools such as IDA Pro and Ghidra.
- Expertise in ARM64 architecture with hands-on experience in reverse engineering and an understanding of its properties.
- Experience in vulnerability research including attack surface assessment, vulnerability discovery through fuzzing or code auditing, and proof-of-concept development.
- Proficiency in software development with low-level programming (C and/or Rust and ARM assembly language).
- Deep knowledge of mobile OS (iOS or Android) internals and current security exploitation techniques.
- Experience with wireless communication systems (e.g., Bluetooth, Wi-Fi, cellular) and their interactions with mobile devices.
Responsibilities
- Perform in-depth reverse engineering of mobile software, firmware, and hardware components to identify security flaws.
- Analyze and develop proofs-of-concept for vulnerabilities across a variety of targets, including mobile kernels, applications, and communication protocols.
- Discover and exploit vulnerabilities, including those that can lead to memory corruption and logical errors in code.
- Bypass advanced exploit mitigations such as ASLR, code signing, non-executable memory protections, and sandboxing.
- Refine and integrate exploitation techniques to accurately assess vulnerability severity.
- Automate techniques to identify vulnerabilities, trigger them efficiently, and optimize exploitation processes.
- Lead and mentor a team conducting vulnerability research on mobile technologies
Other
- Bachelor’s degree in Computer Science or a related technical field.
- At least 6 years of professional experience in reverse engineering.
- Active Top Secret clearance and be able to obtain a SCI and CI polygraph after hire.
- Previous experience in a client-facing technical role.
- Clearly document and communicate technical findings through detailed reports and briefings to technical and non-technical audiences.