Zetier ยท 3 days ago
Principal Vulnerability Researcher
Zetier is seeking Principal Vulnerability Researchers to analyze and counter malicious software and develop operationally critical cyber capabilities. The role involves designing, developing, and deploying tools related to command and control, persistence, and networking.
Cloud ComputingCyber SecurityDatabaseTechnical Support
Responsibilities
Highly experienced with reverse engineering compiled programs (C/C++)
Highly experienced in reading common assembly languages (x86, x86-64, ARM)
Experience developing in scripting languages (Python)
Experience with debuggers and decompilers (gdb, Binja, IDA Pro)
Ability to obtain and maintain a U.S. security clearance
Experience developing/defeating mitigations (ASLR, DEP, N^X)
Developed defeats of common anti-RE techniques (obfuscation)
Detailed understanding of embedded platforms (FPGA, physical memory)
Securely implemented cryptographic primitives (AES-GCM, SHA256, ECDSA)
Experience with program analysis tools and techniques (control flow, program slicing, taint tracing)
Effective use of automated analysis (fuzzers, emulation, sandbox)
Deep knowledge of file systems and formats (ELF, PE, Mach-O)
Effective communication with customers and teammates
Experience developing proof-of-concept exploits
Active U.S. security clearance
Qualification
Required
Highly experienced with reverse engineering compiled programs (C/C++)
Highly experienced in reading common assembly languages (x86, x86-64, ARM)
Experience developing in scripting languages (Python)
Experience with debuggers and decompilers (gdb, Binja, IDA Pro)
Ability to obtain and maintain a U.S. security clearance
Preferred
Experience developing/defeating mitigations (ASLR, DEP, N^X)
Developed defeats of common anti-RE techniques (obfuscation)
Detailed understanding of embedded platforms (FPGA, physical memory)
Securely implemented cryptographic primitives (AES-GCM, SHA256, ECDSA)
Experience with program analysis tools and techniques (control flow, program slicing, taint tracing)
Effective use of automated analysis (fuzzers, emulation, sandbox)
Deep knowledge of file systems and formats (ELF, PE, Mach-O)
Effective communication with customers and teammates
Experience developing proof-of-concept exploits
Active U.S. security clearance