excellence, ensuring application release quality. Qualifications/Skills: C+/23 skills, knowledge of the STL, experience of the Boost libraries is highly desirable. Development on Linux using gcc, gdb, git and associated debugging tools. Knowledge of all aspects of software design, development and deployment. Working knowledge of FX and/or FI products, pricing and Real Time risk management. More ❯
custom logic functions. Ability to work closely with hardware engineers to define and implement custom logic requirements. Experience with embedded software testing, debugging, and integration on hardware using debuggers (gdb, lldb, etc.), test equipment (scopes, analyzers, multi-meters, etc.), and UARTs, JTAGs and oscilloscopes. Experience working in mission-critical industries (aerospace, automotive, defense, first responder, medical devices, etc.) and turning More ❯
more years of Software development experience using C, C/C++, or other proprietary languages Experience with Software Reverse Engineering and/or debugging tools, such as IDAPro, OllyDbg, gdb, etc. Experience with Configuration, administration, and development experience in Virtual Environments (VMWare/ESXi, Open Stack, Open vSwitch, QEMU) Experience developing on embedded platforms (Linux, Unix, Android, VxWorks) Familiarity with More ❯
C/C++, Python and Assembly language Experience developing for operating system internals (e.g. Windows, Linux, Android, iOS, Embedded systems) Experience with network programming Experience with debuggers (e.g. WinDBG, gdb, lldb, adb, ollydbg) Experience with test frameworks (e.g. GoogleTest, CMock, Catch2, pytest) Experience working well in a team It would be great if you also have: Experience writing software in More ❯
or Testing Development experience with Virtual Environments (VMWare/ESXi, Open Stack, Open vSwitch, QEMU) Experience with Software Reverse Engineering and/or debugging tools, such as IDAPro, OllyDbg, gdb, Ghidra, etc. Familiarity with assembly languages (development or reversing) Knowledge of low level, systems programming concepts Desired Skills: Experience with vulnerability analysis and exploit development Experience with Python Experience with More ❯
C/C++, Python and Assembly language Experience developing for operating system internals (e.g. Windows, Linux, Android, iOS, Embedded systems) Experience with network programming Experience with debuggers (e.g. WinDBG, gdb, lldb, adb, ollydbg) Experience with test frameworks (e.g. GoogleTest, CMock, Catch2, pytest) Experience working well in a team It would be great if you also have: Experience writing software in More ❯
Windows internals • Experience with ARM, MIPS, PowerPC, and/or x86 architectures • Ability to read and write C, C++ and Assembly • Trace code execution in a debugger (windbg/gdb/IDA Pro) • Experience performing reverse engineering with IDA Pro or similar tools • Understanding exploitation and security techniques (have built ROP chains, defeat ASLR, etc.) • Experience with socket programming and More ❯
platforms. programming CNO tools and techniques Network sockets programming and expert packet-level understanding of IP, TCP, and application-level protocols. Tracing code execution in a debugger (WinDbg/gdb/IDA Pro). Reverse engineering native binaries. Developing proof-of-concept exploit software Knowledge of Unix kernel internals, including the OS runtime linker/loader, object file formats (e.g. More ❯
engineering, kernel debugging, and/or protocol stacks Experience developing computer exploits Experience in Software Reverse Engineering with at least 1 of the following tool or an equivalent: IDAPro, GDB, WinDbg, Immunity/OllyDbg Knowledge of analyzing shellcode, packed and obfuscated and the associated algorithms Experience in host and network analysis to identify and characterize anomalies and vulnerabilities in the More ❯
and experience with ARM platform and architecture/instruction set. Experience with one or more standard hardware protocols (USB, UART, SPI, I2C, I2S, PCIe) Experience with debuggers such as gdb, lid, etc. Able to comprehend hardware specs and schematics. Experience developing drivers/applications in Unix, Linux, or MacOS Excellent written and verbal communication skills. BS or MS in Computer More ❯
with Full Scope Polygraph, current CI under 6 yrs Preferred Technical Skills: • Experience in Software Reverse Engineering with at least 1 of the following tool or an equivalent: IDAPro, GDB, WinDbg, Immunity/OllyDbg • Experience in malware analysis and mitigation techniques • Strong understanding of the Windows and Linux Operating System internals and APIs • Knowledge of analyzing shellcode, packed and obfuscated More ❯
both) Bachelor's degree in Computer Science or related field Proficient in Python and C development for development and debugging Experience with reverse engineering tools (e.g. IDA Pro, Ghidra, gdb, WinDbg) Familiarity with ARM and/or x86 architecture Understanding of security mitigation techniques such as ASLR, DEP, NX, sandboxing Experience with version control systems such as Git or GitLab More ❯
static/dynamic analysis tools, such as Frida, Jadx, Ghidra, or IDA. Experience with vulnerability research and debugging. Nice to Haves: Experience with C/C++. Experience debugging with gdb or similar tools. Knowledge of Android or iOS operating system, architecture, and ecosystem. Experience with high-side development. Experience with non-attributed networks. Experience with cloud environments (e.g., AWS). More ❯
Linux and Windows kernel development, with deep knowledge of Windows internals. Strong programming skills in Python and C, including hands-on experience debugging C applications using tools such as GDB and PyDB. Expertise in reverse engineering, malware analysis, and systems exploitation, including vulnerability discovery and exploit development. In-depth understanding of Windows low-level systems programming, including familiarity with relevant More ❯
ranging from entry-level (1-3 years) to senior-level expertise (5+ years). Proficiency with reverse engineering tools (e.g., IDA Pro, Ghidra, Binary Ninja) and debugging tools (e.g., GDB, WinDbg). Familiarity with programming and scripting languages relevant to reverse engineering and embedded systems development (e.g., C, C++, Python). Knowledge of operating systems internals, firmware, and protocols. Strong More ❯
Assembly to demonstrate ability to control the flaws Requirements Strong C, Python, and ASM development experience Experience reading and writing assembly (x86/x64) Extensive experience with debuggers (ADB, GDB, etc.) Working as a team with researchers and developers Preferred Understanding of Linux Kernel and device derivers More ❯
Ruby) Software development experience in C/C++ Detailed understanding of and experience in Vulnerability Research (VR)/Reverse Engineering (RE) Proficiency with disassemblers/debuggers (e.g., IDA Pro, GDB, Windbg) Bachelors degree plus 12 years of technical experience. Additional experience may be substituted in lieu of degree. Optional Skills: Familiarity with PE/ELF file formats, linkers, and compilers More ❯
Campbell, California, United States Hybrid / WFH Options
Vortexlink, Inc
and optimizations of LLM models Knowledge in privacy preserving Machine Learning techniques and approaches such as MPC, FHE and ZKP is helpful. Familiarity with developer and debugging toolchains (e.g. gdb) Strong Experience in Advanced System Algorithms with performance understanding and optimizations (Hardware and Software) Collaborate with our engineering team to deliver real-world applications on custom HW and SW/ More ❯
sets, experience with QT Designer/Builder a plus Experience programming in OpenGL and a basic understanding of 2D/3D mapping UI a plus Experience debugging software with GDB Moseley Technical Services, Inc. is an AA/EEO/Veterans/Disabled Employer Still have questions? Reach out to Brian- (Phone) (Email) What to Expect Moseley Technical Services, Inc. More ❯
Familiarity with signal processing techniques, such as signal-to-noise ratio analysis Hands-on experience in debugging and testing software systems and embedded devices using common tools such as GDB/clangdb Personal characteristics A team player who uses initiative is enthusiastic and engaging Ability to manage multiple tasks, organised and a drive to follow through projects to successful outcomes More ❯
Understanding and experience with debuggers CNO tools development Reverse Engineering Demonstrated understanding of Windows Low Level Systems development and API Hands-on experience with debugging tools such as: GDB (GNUDebugger): Used primarily for debugging applications written in C/C++. Candidates should be proficient in setting breakpoints, inspecting memory, controlling execution flow, analyzing core dumps, and performing step-by … TCP/IP, IPv6, routing concepts, network mapping, subnetti Programming or reverse engineering x86, x64, ARM, MIPS, or PowerPC assembly Programming and debugging tools such as: IDA Pro, gcc, gdb, OllyDbg Experience with software vulnerabilities such as stack overflows, heap overflows, numeric overflows, input validation More ❯