/r/netsec's Q1 2017 Information Security Hiring Thread

Novetta has an exciting opportunity for a self-motivated and accomplished Vulnerability Researcher/Reverse Engineer (VR/RE) to join our Engineering team. The ideal candidate will be working as a researcher, auditing software for exploitable vulnerabilities. To be successful, the candidate must have a solid understanding of operating system internals and low level programming languages like C and assembly, but also a creative mind for identifying and exploiting flaws in software. The candidate must possess experience in reverse engineering, debugging, and operating system/networking communication protocols. Candidate is required to have exceptional communication skills to produce thorough documentation, give presentations, and communicate with customers regularly.

Basic Qualifications: Demonstrable experience with different types of software bugs: buffer overflows, integer overflows, race conditions etc. Demonstrable experience in Low Level Languages: C, Assembly (x86/x64, ARM). Ability to utilize scripting languages to assist in development tasks: Python, Ruby, Perl. Demonstrable experience with static and dynamic debuggers: IDA Pro Familiar with various hex editors. Experience with mobile device connection technologies: USB, NFC, Bluetooth and WiFi. Experience with an IDE: Xcode and Android Studio. Solid understanding of network analysis tools: Wireshark, TCPDump. Familiarity with microprocessors and the corresponding assembly languages: ARM. Experience with Mobile operating systems internals (user and kernel space): Android and iOS.

Apply at www.novetta.com

Desired Skills:

Demonstrable experience with modern operating system security features. Solid understanding of the CNO mission, including: cryptography, persistence, networking, vulnerability research, exploit development, and implant development.

/r/netsec Thread