from design to delivery in modern IDEs and languages, using Agile delivery. Creating tested and testable code. Integrating with automated verification systems, CI and CD pipelines. Requirements: IDAPro or Ghidra for reverse engineering. C, C++, Java or C# for solution creation. Python, Bash, Powershell or Groovy for prototyping and tool-making. Linux or Android OS More ❯
Looking For Proficiency in one or more of C, C++, Java or C#. Familiarity with scripting and automation using Python, Bash, Powershell or Groovy. Experience working with IDAPro or Ghidra for reverse engineering Experience working with Linux or Windows-based systems. Awareness of secure coding practices and modern cybersecurity threats. Knowledge of principles used in More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Arm Limited
Solid understanding of memory-safety vulnerabilities, undefined behaviour, sanitisers, and compiler instrumentation. Demonstrated ability to triage crashes using debuggers, profilers, and reverse-engineering tools (gdb/lldb, IDA/Ghidra). Excellent written communication for documenting findings and influencing engineering teams. "Nice To Have" Skills and Experience : Contributions to open-source fuzzing tools, sanitisers, or security More ❯
common flaws in low-level software, as well as web platforms (e.g. SQL injection, XSS, CSRF, SSRF, upload/download abuse, RCE). Reverse engineering experience (e.g. IDAPro, Ghidra). More ❯
Solihull, West Midlands, West Midlands (County), United Kingdom
Matchtech Group Plc
common flaws in low-level software, as well as web platforms (e.g. SQL injection, XSS, CSRF, SSRF, upload/download abuse, RCE). Reverse engineering experience (e.g. IDAPro, Ghidra). More ❯
research, reverse engineering, or exploit development (professional background or other e.g. capture the flag challenges, bug bounties). Familiarity with a variety of tools and platforms (Ghidra, IDA, Unicorn, debuggers, Android, iOS...). Knowledge of low-level programming languages across the application stack. Understanding of the exploit development lifecycle from identifying bugs up to proof-of More ❯