The successful candidate will develop tools for the discovery of threats to system integrity
Detailed responsibilities include analyzing software implementation, identifying potential points where hackers could enter, developing mitigation techniques against these entry points and conducting PoC exploits during distributed systems testing
Publishing research findings in related academic journals or industry publications would also be expected from the selected applicants
Требования
They should be experienced with web application vulnerabilities as well as operating systems
Knowledge of WASM or Rust/Go development is advantageous; experience in CTF events can also contribute positively