research projects from concept through delivery Desirable Experience: Hardware prototyping, PCB design and microcontroller programming. Experience using penetration testing or red team tools. Reverse engineering using Ghidra, IDAPro, or Binary Ninja. Vulnerability research, including exploit development and mitigation bypass techniques. Embedded software development on ARM, AVR, PowerPC or MIPS platforms. Experience with Radio Frequency (RF More ❯
research projects from concept through delivery Desirable Experience: Hardware prototyping, PCB design and microcontroller programming. Experience using penetration testing or red team tools. Reverse engineering using Ghidra, IDAPro, or Binary Ninja. Vulnerability research, including exploit development and mitigation bypass techniques. Embedded software development on ARM, AVR, PowerPC or MIPS platforms. Experience with Radio Frequency (RF More ❯
research projects from concept through delivery Desirable Experience: Hardware prototyping, PCB design and microcontroller programming. Experience using penetration testing or red team tools. Reverse engineering using Ghidra, IDAPro, or Binary Ninja. Vulnerability research, including exploit development and mitigation bypass techniques. Embedded software development on ARM, AVR, PowerPC or MIPS platforms. Experience with Radio Frequency (RF More ❯
problem-solving capabilities, with a methodical and inquisitive approach to technical challenges. Eligible for or hold active eDV clearance Desirable Experience: Reverse engineering using tools such as IDAPro, Ghidra, or Binary Ninja. Vulnerability research, including exploit development and mitigation bypass techniques. Embedded software development for platforms such as ARM Cortex, AVR, or MIPS. Experience with More ❯
problem-solving capabilities, with a methodical and inquisitive approach to technical challenges. Eligible for or hold active eDV clearance Desirable Experience: Reverse engineering using tools such as IDAPro, Ghidra, or Binary Ninja. Vulnerability research, including exploit development and mitigation bypass techniques. Embedded software development for platforms such as ARM Cortex, AVR, or MIPS. Experience with More ❯
problem-solving capabilities, with a methodical and inquisitive approach to technical challenges. Eligible for or hold active eDV clearance Desirable Experience: Reverse engineering using tools such as IDAPro, Ghidra, or Binary Ninja. Vulnerability research, including exploit development and mitigation bypass techniques. Embedded software development for platforms such as ARM Cortex, AVR, or MIPS. Experience with More ❯
Strong understanding of hardware/software development lifecycles and security implications. Applied knowledge of cryptographic algorithms and secure systems design. Expertise in reverse engineering tools (e.g. Ghidra, IDAPro) and debugging (e.g. GDB). Familiarity with Linux internals, embedded systems, and exploitation techniques. Passion for learning, testing systems, and uncovering security flaws. Additional Info: Applicants must More ❯
Looking For Proficiency in one or more of C, C++, Java or C#. Familiarity with scripting and automation using Python, Bash, Powershell or Groovy. Experience working with IDAPro or Ghidra for reverse engineering Experience working with Linux or Windows-based systems. Awareness of secure coding practices and modern cybersecurity threats. Knowledge of principles used in More ❯
Intelligence Analyst, or similar role with a focus on malware research and response. Strong knowledge of reverse engineering tools and techniques for malware analysis, including tools like IDAPro, Ghidra, OllyDbg, or similar. Familiarity with programming languages such as Python, C++, or assembly for developing analysis tools and scripts. Expertise in creating and maintaining YARA rules. More ❯
Intelligence Analyst, or similar role with a focus on malware research and response. Strong knowledge of reverse engineering tools and techniques for malware analysis, including tools like IDAPro, Ghidra, OllyDbg, or similar. Familiarity with programming languages such as Python, C++, or assembly for developing analysis tools and scripts. Expertise in creating and maintaining YARA rules. More ❯
Intelligence Analyst, or similar role with a focus on malware research and response. Strong knowledge of reverse engineering tools and techniques for malware analysis, including tools like IDAPro, Ghidra, OllyDbg, or similar. Familiarity with programming languages such as Python, C++, or assembly for developing analysis tools and scripts. Expertise in creating and maintaining YARA rules. More ❯
Intelligence Analyst, or similar role with a focus on malware research and response. Strong knowledge of reverse engineering tools and techniques for malware analysis, including tools like IDAPro, Ghidra, OllyDbg, or similar. Familiarity with programming languages such as Python, C++, or assembly for developing analysis tools and scripts. Expertise in creating and maintaining YARA rules. More ❯
london (city of london), south east england, united kingdom
NCC Group
Intelligence Analyst, or similar role with a focus on malware research and response. Strong knowledge of reverse engineering tools and techniques for malware analysis, including tools like IDAPro, Ghidra, OllyDbg, or similar. Familiarity with programming languages such as Python, C++, or assembly for developing analysis tools and scripts. Expertise in creating and maintaining YARA rules. More ❯