Lead a high-performing team of offensive security researchers, supporting professional development and team wellbeing through regular video check-ins.
Facilitate regular and transparent communication via weekly and event-driven status updates covering achievements, challenges, team needs, and research progress.
Create a collaborative and supportive team environment by promoting documentation, knowledge sharing, and technical presentations.
Organize and lead engaging weekly team calls for resource sharing, brainstorming research directions, and collaborative problem-solving.
Mentor junior researchers and new hires, supporting strong onboarding, continuous learning, and ongoing professional growth.
Manage technical recruitment activities, including interviewing and evaluating candidates.
Conduct performance reviews, provide feedback, and communicate outcomes to leadership.
Plan and manage the team’s budget, covering travel, training, and conference opportunities.
Attend leadership meetings and coordinate cross-team initiatives; align team objectives with organizational priorities.
Oversee and guide the identification, analysis, and exploitation of vulnerabilities in modern operating systems, kernel components, and complex software ecosystems.
Direct research in reverse engineering, proof-of-concept exploit development, and bypassing advanced security mitigations.
Set technical priorities for the team, balancing current research objectives with exploration of new attack surfaces and technologies.
Ensure research stays current with evolving attack techniques, mitigations, and emerging technologies.
Encourage dissemination and publication of impactful research and adaptive approaches to industry-wide software/security updates.
Requirements
Proven experience leading or mentoring technical teams in offensive security or vulnerability research.
Extensive track record of iOS vulnerability research and exploitation on modern devices and chipsets.
Strong understanding of recent iOS mitigations such as Pointer Authentication Codes (PAC), Secure Page Table Monitor (SPTM), and Memory Integrity Extension (MIE), etc.
Advanced expertise in vulnerability discovery, reverse engineering, and exploit development within the iOS operating system or platform.
Strong programming skills, including proficiency in C, C++, and low-level assembly.
Familiarity with industry-standard toolsets for reverse engineering and debugging.
Excellent organizational, communication, and team-building skills.
Demonstrated history of impactful security research (e.g., advisories, assigned CVEs, or technical publications).
Tech Stack
Assembly
iOS
Benefits
Bonus scheme
An additional week of leave per annum plus the option to buy or sell up to 2 weeks additional annual leave.
Salary continuance insurance (SCI pays 75% of your base salary and bonus for up to 2 years)
Flexible working hours and patterns depending on location
Discounted private health insurance
Life & Total Permanent Disability Cover
Novated Car Leasing
Company supported professional development programs