Vulnerability Researcher

State College, PA

Applications have closed

Vulnerability Researcher

Zetier seeks senior Vulnerability Researchers to analyze and counter malicious software and develop operationally critical cyber capabilities. Candidates will demonstrate practical experience designing, developing, and deploying tools intersecting command and control, persistence, and networking.

Required:

  • Highly experienced (4+ years) reverse engineering compiled programs (e.g. C/C++)
  • Fluent reading common assembly languages (e.g. x86, x86-64, ARM)
  • Experienced developing in scripting languages (e.g. Python, Javascript)
  • Familiarity with debuggers and decompilers (e.g. gdb, Binja, IDA Pro)
  • Ability to obtain and maintain a U.S. security clearance
  • Compliance with EO14042 (COVID19 vaccination)

Desired:

  • Experience developing/defeating mitigations (e.g. ASLR, DEP, N^X)
  • Developed defeats of common anti-RE techniques (e.g. obfuscation)
  • Detailed understanding of embedded platforms (e.g. FPGA, physical memory)
  • Securely implemented cryptographic primitives (e.g. AES-GCM, SHA256, ECDSA)
  • Familiar with program analysis tools and techniques (e.g. control flow, program slicing, taint tracing)
  • Effective use of automated analysis (e.g. fuzzers, emulation, sandbox)
  • Deep knowledge of file systems and formats (e.g. ELF, PE, Mach-O)
  • Effective communication with customers and teammates
  • Experience developing proof-of-concept exploits
  • Active U.S. security clearance

Tags: AES C C++ Clearance Compliance ECDSA Exploits JavaScript Python Reverse engineering Scripting Security Clearance

Region: North America
Country: United States
Job stats:  6  0  0
Category: Research Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.