Upvote
Downvote
Vulnerability Researcher 2
Share Job
- Suggest Revision
- Candidates must be able to play both sides of the fence, both developing and defeating new and advanced security techniques.
- Experience reading or writing assembly (x86, x64, ARM, PPC, MIPS, SPARC, 68k, or others)
- Experience developing embedded systems
- Understanding of network protocols (TCP/IP stacks, wire-level protocols, RF communications, BGP, routing protocols, or others).
- Experience using reverse engineering tools such as IDA Pro, HexRays, Ghidra, Binary Ninja, or objdump.
Active Job
Updated YesterdaySimilar Job
Relevance
Active