Required Senior Vulnerability Researcher
What will you do:
The vulnerability researcher will explore different security aspects of new technologies and suggest novel ways to break and protect these technologies.
Vulnerability research of many interesting technologies and popular products. Everything could be an option, from Internal OS components to cloud SaaS services, from DevOps tools to Linux Containers, etc.
Focusing on finding identity-related vulnerabilities and new attack vectors on any kind of digital identity: human, application, and machine identities.
Development of exploitation and mitigation POCs and tools.
Working together with R&D and PM to shape our future features & products.
Initiate and help driving innovation around your research area.
Writing blog posts and presenting new research work at security conferences such as Blackhat, DEFCON, RSA.
What will you do:
The vulnerability researcher will explore different security aspects of new technologies and suggest novel ways to break and protect these technologies.
Vulnerability research of many interesting technologies and popular products. Everything could be an option, from Internal OS components to cloud SaaS services, from DevOps tools to Linux Containers, etc.
Focusing on finding identity-related vulnerabilities and new attack vectors on any kind of digital identity: human, application, and machine identities.
Development of exploitation and mitigation POCs and tools.
Working together with R&D and PM to shape our future features & products.
Initiate and help driving innovation around your research area.
Writing blog posts and presenting new research work at security conferences such as Blackhat, DEFCON, RSA.
Requirements:
What you need to succeed:
5+ years of experience in security research
Proven research skills: Vulnerability hunting, Red Teaming, Advanced PT, Reverse Engineering, etc.
Proven expertise in one or more of the fields: application security, Kernel security, cloud security, DevOps technologies, identity security components (MFA, OAuth, etc.), network protocols or web applications.
Ability to write blog posts, open-source tools, and present research work on conference stages.
Be part of a top research team, be able to collaborate, share insights, get and give tips.
How will you significantly stand out from the crowd
Previously published CVEs or blog posts and articles covering own research work.
Development experience.
Previous experience with presenting technical related material.
What you need to succeed:
5+ years of experience in security research
Proven research skills: Vulnerability hunting, Red Teaming, Advanced PT, Reverse Engineering, etc.
Proven expertise in one or more of the fields: application security, Kernel security, cloud security, DevOps technologies, identity security components (MFA, OAuth, etc.), network protocols or web applications.
Ability to write blog posts, open-source tools, and present research work on conference stages.
Be part of a top research team, be able to collaborate, share insights, get and give tips.
How will you significantly stand out from the crowd
Previously published CVEs or blog posts and articles covering own research work.
Development experience.
Previous experience with presenting technical related material.
This position is open to all candidates.