requirements (PIRs) across various cyber threat activity topics What You'll Bring (Required): Experience with static and dynamic malware analysis of Windows binaries using tools such as IDAPro, Ghidra, Binary Ninja, Windbg, x64dbg, dnSpy, and Wireshark Experience writing network and endpoint signature detections using YARA, Sigma, and Snort rules Experience scripting in Python, Go, PowerShell More ❯
from design to delivery in modern IDEs and languages, using Agile delivery. Creating tested and testable code. Integrating with automated verification systems, CI and CD pipelines. Requirements: IDAPro or Ghidra for reverse engineering. C, C++, Java or C# for solution creation. Python, Bash, Powershell or Groovy for prototyping and tool-making. Linux or Android OS More ❯
Looking For Proficiency in one or more of C, C++, Java or C#. Familiarity with scripting and automation using Python, Bash, Powershell or Groovy. Experience working with IDAPro or Ghidra for reverse engineering Experience working with Linux or Windows-based systems. Awareness of secure coding practices and modern cybersecurity threats. Knowledge of principles used in More ❯
common flaws in low-level software, as well as web platforms (e.g. SQL injection, XSS, CSRF, SSRF, upload/download abuse, RCE). Reverse engineering experience (e.g. IDAPro, Ghidra). More ❯
Solihull, West Midlands, West Midlands (County), United Kingdom
Matchtech Group Plc
common flaws in low-level software, as well as web platforms (e.g. SQL injection, XSS, CSRF, SSRF, upload/download abuse, RCE). Reverse engineering experience (e.g. IDAPro, Ghidra). More ❯
research, reverse engineering, or exploit development (professional background or other e.g. capture the flag challenges, bug bounties). Familiarity with a variety of tools and platforms (Ghidra, IDA, Unicorn, debuggers, Android, iOS...). Knowledge of low-level programming languages across the application stack. Understanding of the exploit development lifecycle from identifying bugs up to proof-of More ❯