Finding vulnerabilities in ubiquitous Internet-deployed software and/or popular devices’ software or firmware.
Constructing exploits for vulnerabilities discovered by yourself or your team.
Guiding the teams technical outcomes to measurable deliverables for the organisation.
Training, management and provision of guidance to all levels of team members.
Regular interaction with managers and customer-facing staff members to field queries and questions about technical work.
Take an active role in cross-team projects when required.
Requirements
3+ years of Vulnerability Research, reverse engineering, and bug-hunting.
Experience with static and dynamic binary analysis.
Experience with iOS, Android, Windows, Linux, or embedded systems kernel, user land, and internals or browser internals.
Experience with common tools in security research (e.g. IdaPro, Ghidra, Radare, Binary Ninja, AFL, SysInternals, GDB, WinDBG, etc).
Experience with common programming languages (e.g. C/C++, Python, Swift, etc).
Experience with common architectures (e.g. x86/64, ARM, AARCH64, MIPS, PowerPC, TILEGX, etc).
Experience with modern security system features, exploit mitigations, and evasion techniques (e.g. defeating ASLR, DEP, Control Flow Guard, ROP, Security Product/AV Evasion, etc).
Experience with a wide-range of modern exploitation concepts and techniques.
Tech Stack
Android
iOS
Linux
Python
Swift
Benefits
Bonus scheme
An additional week of leave per annum plus the option to buy or sell up to 2 weeks additional annual leave.
Salary continuance insurance (SCI pays 75% of your base salary and bonus for up to 2 years)
Flexible working hours and patterns depending on location
Discounted private health insurance
Life & Total Permanent Disability Cover
Novated Car Leasing
Company supported professional development programs