DevJobs

Researcher

Overview
Skills
  • Assembly Assembly
  • C C
  • C++ C++
  • Embedded Low-Level development ꞏ 5y
  • BinaryNinja
  • Ghidra
  • hooks
  • IDA Pro
  • instrumentation
  • Cryptography
  • non-standard processor architectures
  • proprietary processor architectures
  • PX4
  • RF
  • ARM
We are looking for a highly skilled Security Researcher to join our cyber department. We need a "Hacker-Developer" hybrid who can balance a 50/50 workflow: conducting deep-dive offensive research on complex embedded systems while architecting the sophisticated tools and codebases that power our capabilities.

Responsibilities

  • Offensive Research & Analysis
  • Vulnerability Research (VR): Conduct deep-dive research into embedded systems to identify exploitable security flaws and potential attack vectors.
  • Reverse Engineering: Deconstruct complex binary components, firmware, and diagnostic systems to uncover hidden logic and vulnerabilities, with a specific focus on drone technology.
  • Exploitation & Embedded Instrumentation: Perform in-depth diagnostics of hardware/software interactions, utilizing hooks and custom instrumentation to validate vulnerabilities and demonstrate potential impact.
  • Development & Research Framework
  • Research Framework Development: Design and build our sophisticated research framework and automation tools tailored for the team’s offensive needs, focusing on custom hooking frameworks and system-level monitoring.
  • Technical Support for R&D: Serve as a technical bridge for the development teams, providing expert guidance on low-level system behavior and solving complex technical bottlenecks.
  • Embedded Programming: Write mission-critical, high-efficiency code in low-level environments to support research payloads, specialized hooks, and diagnostic tools.

Requirements:

  • 5+ years of proven experience in Embedded Low-Level development.
  • Expert proficiency in C/C++ and Assembly.
  • Deep understanding of ARM architecture.
  • Prior experience working within or alongside an Offensive Cyber Security Research department.
  • Hands-on experience with RE tools (BinaryNinja, Ghidra, IDA Pro, etc.) and implementing hooks/instrumentation on embedded platforms.

Advantages

  • Experience with non-standard or proprietary processor architectures.
  • Familiarity with Cryptography protocols and RF (Radio Frequency) communications.
  • Graduates of elite IDF technological units (e.g., 81, 8200) – Significant Advantage.
  • Familiarity with drone flight controllers, PX4, or similar embedded robotics platforms.
Sentrycs