Security Researcher

Information Technology Limassol

Job Description

Our client is a new and exciting, well-funded startup pioneering the Cyber Security industry. Developing and creating  innovative defense and security solutions. If you are an Experienced researcher who seeks an exciting challenge where you will be given the support to reach your full potential, then this Security Researcher position is an excellent opportunity for you.  The successful candidate will be based in Limassol – relocation package will be provided for the candidates that aren’t Cyprus residents. EU and non EU citizens are welcome to apply.

This is a top-notch Security Research Engineer. In this position you will expose new threats facing advanced IoT systems by developing new exploits and attack vectors that will enable us to conduct ethical penetration of the most advanced network enabled devices.

Reference #: GC002867

Job Responsibilities

  • Responsible for penetration testing, attack surfaces and vulnerability assessment of embedded systems
  • Responsible for research and analysis of proprietary networks and protocols
  • Hardware and software reverse-engineering on a variety of platforms
  • Maintains substantial knowledge of state-of-the-art security principles, theories, and attacks and contributes to literate and conferences.
  • Require thorough knowledge of security practices, procedures and capabilities in order to perform non-repetitive, analytical work

Requirements

  • Extensive experience in cyber security reverse engineering
  • Experience with Embedded system or OS internals
  • Android or iOS development and mobile operating systems security
  • Ability to rapidly learn new protocols, programming languages, and architectures, and to apply that knowledge to the analysis of network traffic, exploit code, and system configurations
  • Understanding of analysis methodologies and research techniques
  • Experience with reverse engineering tools e.g. disassemblers, debuggers, instrumentation frameworks, etc.
  • Understanding of concepts in vulnerability research: Shellcode, ROP, ASLR, exploit types, and heap manipulation
APPLY FOR THIS JOB