Enable job alerts via email!

Vulnerability Researcher

Apple Inc.

London

On-site

GBP 50,000 - 80,000

Full time

7 days ago
Be an early applicant

Job summary

A leading technology company based in London is seeking an experienced professional for a role in vulnerability research. You will analyze and exploit vulnerabilities in Apple products, requiring a passion for security and solid technical skills. The ideal candidate will have experience in vulnerability research and a creative approach to problem-solving. This position offers a collaborative environment with exposure to various teams and technologies.

Qualifications

  • Proven experience in vulnerability research and binary exploitation.
  • Significant understanding of common vulnerability classes and exploitation techniques.
  • Creative & effective problem-solving and analytical skills.
  • Ability to work independently and in a team environment.

Responsibilities

  • Conduct vulnerability research on Apple software, firmware, and hardware components.
  • Analyze and exploit vulnerabilities in various systems.

Skills

Vulnerability research
Binary exploitation
Problem-solving
Analytical skills
Team collaboration

Tools

IDA Pro
Ghidra
Programming in C
Programming in C++
Programming in Python
Programming in Swift
Programming in Objective-C

Job description

London, England, United Kingdom Software and Services

Description

Safari, Mail or Messages. Evaluating the security of iOS and macOS kernels, boot ROMs, firmware and hardware are all included in the scope of the team. Working alongside a wide variety of teams and vendors, your influence will be felt throughout Apple's products such as the iPhone, iPad, Mac and Apple TV.As a member of the team, one of your main responsibilities will be to conduct vulnerability research on Apple software, firmware and hardware components. Analyzing and exploiting vulnerabilities is also a key element of the role. This position requires someone with strong technical skills and a passion to secure systems by showing how they can be broken.If this is you, we'd love to hear from you.

Minimum Qualifications
  • Proven experience in vulnerability research and binary exploitation
  • Significant understanding of common vulnerability classes and exploitation techniques
  • Creative & effective problem-solving and analytical skills
  • Ability to work independently and in a team environment
Preferred Qualifications
  • Excellent knowledge of the security architecture of at least one complex operating system. Knowledge of macOS/iOS is nice-to-have, but not required.
  • Experience with reverse-engineering tools (IDA Pro, Ghidra, etc.) and techniques
  • Familiarity with tool development, using programming languages such as C, C++, Python, Swift, Objective-C
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs