Salary
💰 $224,000 - $425,500 per year
About the role
- Identify vulnerabilities in embedded firmware and critical system software
- Build proof of concepts and collaborate with development teams to remediate vulnerabilities
- Improve current tools and offensive practices for bug discovery and evaluation
- Support remediation efforts and exercise modern tools for modeling new attack vectors
- Simulate real attacker behaviors and effectively communicate findings
Requirements
- 12+ years in a security related field
- Proven experience and offensive security research (CVE’s, publications, patents, tools, bounties)
- Strong skills in reverse engineering and automation (IDA, Ghidra)
- Fuzzing (AFL, WinAFL, Syzcaller) and exploitation (ROP, memory corruption)
- Understanding of modern embedded cryptography and common security issues
- Experience with ARM / X86/RISCV assembly (include shellcode development)
- Low-level C programming paired with understanding micro-architectural attacks (side channels, fault injection, etc)
- Secure code reviews of complex source projects
- Exposure to code quality practices (SDL, threat modeling)
- BS/BA degree or equivalent experience
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
reverse engineeringautomationfuzzingexploitationlow-level C programmingARM assemblyX86 assemblyRISCV assemblysecure code reviewsembedded cryptography
Soft skills
collaborationcommunicationproblem-solving