סקירה כללית
We are looking for talented, fast learners to work on vulnerability research and exploitation in embedded and IoT environments. This role is ideal for researchers with strong low-level backgrounds who want to deepen their expertise in IoT and embedded systems security while working on real-world, complex technologies You will analyze proprietary software and hardware, apply a deep understanding of low-level systems, and take your research from initial discovery to a full end-to-end solution in production. Requirements: * 5+ years of experience as a security researcher or industry-equivalent experience. * Understanding of memory corruption (Stack/Heap, UAF) and logical vulnerabilities (Injection, Logic/Design flaws, TOCTOU). * Understanding of common security mitigations such as ASLR, DEP, and CFI. * Expertise in OS internals, file systems, network protocols and cryptography concepts. * Hands-on experience with reverse engineering and debugging tools such as IDA Pro or Ghidra, and GDB. * Proficient in Assembly, C, and Python. Advantages: * B.Sc. or M.Sc. in Computer Science, Mathematics, or Engineering. * Published research (CVEs, blog posts, or talks). * Experience with RF communication schemes such as WiFi, Bluetooth, GPS… * Experience with developing / researching in Android / iOS environments.
דרישות המשרה
* 5+ years of experience as a security researcher or industry-equivalent experience. * Understanding of memory corruption (Stack/Heap, UAF) and logical vulnerabilities (Injection, Logic/Design flaws, TOCTOU). * Understanding of common security mitigations such as ASLR, DEP, and CFI. * Expertise in OS internals, file systems, network protocols and cryptography concepts. * Hands-on experience with r