Mobile Vulnerability Researcher
This position is open to applicants worldwide and does not require relocation.
JOB RESPONSIBILITIES
This role would be responsible for discovering and exploiting vulnerabilities affecting Mobile devices. The work includes attack vector enumeration, static and dynamic analysis of the target, reverse engineering, debugging, identification of vulnerabilities, exploitation, and technical documentation.
REQUIRED QUALIFICATIONS
My client does not require any formal education or certifications.
Qualified candidates should have the following:
- Fluent in C/C++ and ARM and Intel assembly (Hexagon and MIPS are also accepted)
- Demonstrated ability to discover and exploit 0day vulnerabilities in mobile devices
- Understanding of the latest memory corruption mitigations
- Competency with debuggers and IDA Pro
PREFERRED QUALIFICATIONS
- Candidates possessing the following will be given preferential consideration:
- Ability to develop SoC exploits without a debugger and minimal runtime information
- A thorough understanding of Mobile attack surface (e.g., CP, AP, and other areas)
- A thorough understanding of a wide range of vulnerability classes
- A history of publishing or presenting original research -OR- references for production-grade exploit development
BENEFITS
- My client offers a highly competitive base salary, variable bonuses on every project, and a flexible work schedule.