As a Communication Protocols Security Researcher, your day will be filled with stimulating tasks.
Youll start by catching up on the latest in communication protocols.
Then, youll dive into identifying vulnerabilities and developing strategies to exploit them.
Youll also spend time brainstorming with your team to come up with innovative solutions to complex security problems.
you will:
Protocol Analysis: Conduct in-depth research and analysis of various communication protocols to understand their design, implementation, and potential vulnerabilities.
Reverse Engineering and Vulnerability Research: Apply reverse engineering techniques to deconstruct systems and understand their inner workings and Conduct research to discover new vulnerabilities in various systems and technologies.
Solution Implementation: Translate your research findings into practical solutions and implement them in our products.
Product Development: Contribute to the advancement of our products by staying abreast of the latest developments in the field and innovating new features and improvements.
Communication Protocols and Wireless Attacks: work with a variety of communication protocols such as WPA2, WAP3, BLE, BT classic, NFC, RFID, satellite protocols, and more.
Youll start by catching up on the latest in communication protocols.
Then, youll dive into identifying vulnerabilities and developing strategies to exploit them.
Youll also spend time brainstorming with your team to come up with innovative solutions to complex security problems.
you will:
Protocol Analysis: Conduct in-depth research and analysis of various communication protocols to understand their design, implementation, and potential vulnerabilities.
Reverse Engineering and Vulnerability Research: Apply reverse engineering techniques to deconstruct systems and understand their inner workings and Conduct research to discover new vulnerabilities in various systems and technologies.
Solution Implementation: Translate your research findings into practical solutions and implement them in our products.
Product Development: Contribute to the advancement of our products by staying abreast of the latest developments in the field and innovating new features and improvements.
Communication Protocols and Wireless Attacks: work with a variety of communication protocols such as WPA2, WAP3, BLE, BT classic, NFC, RFID, satellite protocols, and more.
Requirements:
Minimum of 4 years of experience as a Security Researcher.
Proficiency in Python and C/C++ is required. Knowledge of Java is an advantage.
Familiarity with Linux is required.
Experience with Assembly, ARM, and x86. Familiarity with rare/unique DSPs – an advantage.
Experience with Android/iOS is an advantage.
Familiarity with Wifi and Bluetooth protocols is an advantage.
Experience with IDA/Ghidra is an advantage.
Experience in reversing of applications is an advantage.
Minimum of 4 years of experience as a Security Researcher.
Proficiency in Python and C/C++ is required. Knowledge of Java is an advantage.
Familiarity with Linux is required.
Experience with Assembly, ARM, and x86. Familiarity with rare/unique DSPs – an advantage.
Experience with Android/iOS is an advantage.
Familiarity with Wifi and Bluetooth protocols is an advantage.
Experience with IDA/Ghidra is an advantage.
Experience in reversing of applications is an advantage.
This position is open to all candidates.