Offer summary
Qualifications:
Proven vulnerability research experience in iOS, Experience with advanced exploitation techniques, ARM reverse engineering required, Knowledge of cryptographic primitives and weaknesses, Understanding of hardware research/board design is an advantage.
Key responsabilities:
- Research on territories with little-explored vulnerability
- Collaborate with passionate researchers solving digital intelligence challenges ahead of the industry
- Creating unique capabilities to extract evidence from mobile devices
- Execute shell code on top-notch, challenging technology platforms
- Contribute to world-class research results enabling lawful evidence extraction