For one of our client we are in charge to research a Security Researcher:
In this role you will:
Mission: Protect what matters most with transparency and trust.
Location: Swiss Laboratory
About Us: Join our dedicated team in our Swiss laboratory, a state-of-the-art facility replicating real-world environments. Here, we conduct cutting-edge security research to safeguard critical systems and data.
Your Role: As a Security Researcher, you will play a pivotal role in our mission. Your responsibilities will include:
- Wireless Communications Analysis: Reverse engineering undocumented protocols and developing corresponding dissectors.
- Device Identification & Attack Detection: Designing and developing strategies for identifying wireless devices and detecting attacks.
- Firmware Analysis: Analyzing and reverse engineering embedded device firmware.
- Vulnerability Research: Investigating 0-day vulnerabilities and developing exploit Proof of Concepts (PoCs).
Key Responsibilities:
- Integration: Collaborate with the Engineering team to integrate research results into our products.
- Attack Scenarios: Develop and integrate attack scenarios into our laboratory for demonstration purposes.
- Research Innovation: Propose new research ideas and select future research topics in collaboration with management and the team.
- Project Management: Plan research activities, manage involved personnel, and ensure timely achievement of results.
- Documentation & Presentation: Prepare thorough documentation and reports of research results, and present them to management and at conferences.
Qualifications:
- Passion and Strong enthusiasm for vulnerability research.
- Proven experience in security research, bug hunting, reverse engineering, or penetration testing.
- Expertise in scripting languages such as Python, Ruby, or Perl.
- Experience with intrusion detection systems and network traffic analysis.
- Proficiency in analyzing binaries in both Windows and Linux environments.
- Experience researching vulnerabilities in embedded devices (e.g., Routers, PLCs, RTUs, HMI).
- Confidence in handling environments with strong confidentiality and data privacy protocols.
- Ability to operate in environments with non-disclosure agreements and high levels of confidentiality.
- Preferred certifications: OSCP, SANS GPEN/GREM, CISSP (not required).
- Experience participating in Capture The Flag (CTF) competitions.
Join Us: Be part of a team that values transparency and trust, and is committed to protecting what matters most. Apply today to contribute to our mission and make a difference in the world of security research.
Branche: EDV
Funktion: Forschung und Entwicklung
Führungsperson: Nein
Anstellungsart: Festanstellung
Karrierestufe: Angestellte/r