/Vulnerability Researcher

Vulnerability Researcher

Fully, RemoteRemoteusvia direct
// Job Type
Full Time
// Salary
Not disclosed
// Posted
3 weeks ago

About the Role

About This Role<br /> We are seeking a talented Vulnerability Researcher or Exploit Engineer to join our security research<br /> team. This role focuses on discovering, analyzing, and demonstrating vulnerabilities in mobile platforms<br /> (Android, iOS) and desktop operating systems (Windows). You will contribute to the development of<br /> advanced security capabilities while working with cutting-edge tools and techniques in vulnerability<br /> research, reverse engineering, and exploitation. Successful candidates will have demonstrable<br /> expertise in at least one of our target platforms and a strong foundation in security principles.<br /> <br /> <strong>CORE RESPONSIBILITIES</strong><br /> • Conduct security research on mobile (Android, iOS) and desktop (Windows) platforms to identify<br /> novel vulnerabilities and attack surfaces<br /> • Develop proof-of-concept exploits and technical demonstrations of discovered vulnerabilities<br /> • Perform reverse engineering and binary analysis on platform code and third-party applications<br /> • Analyze platform architecture, system libraries, and kernel components to understand security<br /> mechanisms<br /> • Document findings with technical depth, including vulnerability chain analysis and impact<br /> assessment<br /> • Contribute to the development of automated tools and frameworks for vulnerability discovery and<br /> exploitation<br /> • Collaborate with cross-functional teams to understand customer requirements and technical<br /> constraints<br /> • Stay current with platform updates, security patches, and emerging vulnerability classes<br /> <br /> <strong>QUALIFICATIONS</strong><br /> Required<br /> • Hands-on experience with at least one of the following platforms: Android, iOS, or Windows<br /> • Strong understanding of operating system internals (kernel architecture, process management,<br /> memory management, IPC mechanisms)<br /> • Proficiency in reverse engineering tools and techniques (debuggers, disassemblers, binary<br /> instrumentation)<br /> • Experience with one or more programming/scripting languages (C, C++, Python, JavaScript,<br /> Java, or assembly)<br /> • Familiarity with common vulnerability classes and exploitation techniques (memory corruption,<br /> logic flaws, permission bypass, etc.)<br /> • Ability to communicate technical findings clearly in writing and through presentations<br /> • Experience working in a security-conscious environment with proper handling of sensitive<br /> vulnerability information<br /> • US citizen with ability to obtain government security clearance<br /> <br /> Preferred<br /> • Published security research, public vulnerability disclosures, or relevant conference presentations<br /> • Experience with mobile platform instrumentation and debugging (Frida, lldb, Android Studio<br /> debugger)<br /> • Expertise in wireless communications, messaging protocols (SMS, RCS, IMS), or network-level<br /> attack vectors<br /> • Proficiency with firmware analysis and hardware security concepts<br /> • Experience with malware analysis and threat research<br /> • Background in threat modeling and security architecture assessment<br /> • Experience developing automation tools for security research (test harnesses, instrumentation<br /> frameworks)<br /> • Current TS/SCI security clearance<br /> <br /> <strong>WHO THRIVES IN THIS ROLE</strong><br /> Skills and credentials matter, but the engineers who excel here share certain qualities that are difficult<br /> to teach and impossible to fake:<br /> • Comfort in chaos — you do your best work when requirements are incomplete, the environment is<br /> unfamiliar, and the answer is not obvious<br /> • Customer obsession with an engineering backbone — you care deeply about outcomes, and you<br /> have the technical depth to deliver them<br /> • Intellectual honesty — you tell customers and colleagues what is true, including when the honest<br /> answer is uncomfortable or inconvenient<br /> • Bias toward action — you make informed decisions quickly, execute, and adjust; paralysis under<br /> ambiguity is not in your vocabulary<br /> • Extreme ownership — you follow problems all the way to resolution, never stopping at the handoff<br /> • Builder instinct — when something does not exist that should exist, you build it; when something<br /> is broken, you fix it rather than file a ticket about it<br /> • Restless curiosity — you go deep on customer domains, not just your own product, because you<br /> understand that credibility is built on comprehension<br /> • Clear, confident communication — you can hold your own in a boardroom and equally in a<br /> terminal window; you adjust register without losing substance

Interested in this job?

Login to Apply

Use our AI to tailor your resume for this Vulnerability Researcher position at The Josef Group.