Vulnerability Researcher @ Cisco | Jobright.ai
JOBSarrow
RecommendedLiked
0
Applied
0
External
0
Vulnerability Researcher jobs in Fulton, MD
Be an early applicantLess than 25 applicants
company-logo

Cisco · 3 hours ago

Vulnerability Researcher

ftfMaximize your interview chances
Communications InfrastructureEnterprise Software
check
Growth Opportunities
check
H1B Sponsor Likelynote

Insider Connection @Cisco

Discover valuable connections within the company who might provide insights and potential referrals.
Get 3x more responses when you reach out via email instead of LinkedIn.

Responsibilities

Perform security analysis to discover new vulnerabilities in software and/or embedded systems.
Create tools for the discovery and triage of vulnerabilities.
Write detailed technical advisories on new vulnerabilities.
Develop proof of concept exploits for testing IPS and IDS effectiveness.
Perform patch analysis to find and trigger vulnerabilities.
Reverse engineer binary applications, protocols, and formats.
Analyze zero-day vulnerabilities and emerging security threats and technologies.
Demonstrate leadership within the security community.

Qualification

Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.

Vulnerability researchReverse engineeringBinary auditingC/C++PythonAssembly x86/x64Assembly ARMFuzzingStatic analysis toolsProof of concept exploitsCommon vulnerabilitiesIDA ProBinary NinjaGhidraTechnical advisoriesPatch analysisNetwork protocol structuresPublished contributions

Required

3+ years of experience in vulnerability research or a closely related area, e.g. exploit, fuzzing or mitigation development
Bachelor’s degree or equivalent in Computer Science, Electrical Engineering, Cyber Security, or other tech-related degree (or equivalent due to work experience)

Preferred

5+ years’ experience with vulnerability research
3+ years’ experience with binary auditing and reverse engineering, and with related tools such as IDA Pro, Binary Ninja, Ghidra, etc. and with plugin development.
3+ years’ experience with C/C++, and a scripting language (e.g., Python), and assembly (e.g., x86/x64, ARM, etc.)
3+ years’ experience with common vulnerabilities and methods of exploitation, such as memory corruption, web application exploitation, file format vulnerabilities, protocol-based weaknesses, etc.
Published technical contributions to the security community (e.g. CVEs, security advisories, blog posts (0-day/n-day analysis), open source contributions, academic publications, etc.)
Candidates with experience in vulnerability research in industrial control systems are encouraged to apply
Knowledge of common file format and network protocol structures.
Ability to work independently with minimum supervision and to tackle additional tasks as the need arises.

Company

Cisco develops, manufactures, and sells networking hardware, telecommunications equipment, and other technology services and products.

H1B Sponsorship

Cisco has a track record of offering H1B sponsorships. Please note that this does not guarantee sponsorship for this specific role. Below presents additional info for your reference. (Data Powered by US Department of Labor)
Distribution of Different Job Fields Receiving Sponsorship
Represents job field similar to this job
Trends of Total Sponsorships
2023 (784)
2022 (1945)
2021 (2392)
2020 (1283)

Funding

Current Stage
Public Company
Total Funding
unknown
1990-02-13IPO· nasdaq:CSCO

Leadership Team

leader-logo
Chuck Robbins
Chairman & CEO
linkedin
leader-logo
Sarah Walker
CEO for UK & Ireland
linkedin
Company data provided by crunchbase
logo

Orion

Your AI Copilot