About the job
Principal Vulnerability Researcher
Zetier is on the lookout for highly skilled Principal Vulnerability Researchers to assess and neutralize harmful software while crafting vital cyber defense capabilities. Ideal candidates will possess robust hands-on experience in creating, developing, and implementing tools that focus on command and control, persistence, and networking.
Key Responsibilities:
- Analyze malicious software and devise countermeasures.
- Design and develop operational cybersecurity tools.
Required Qualifications:
- Extensive experience in reverse engineering compiled programs (C/C++).
- Proficient in interpreting common assembly languages (x86, x86-64, ARM).
- Experience in scripting languages (Python).
- Familiarity with debuggers and decompilers (gdb, Binja, IDA Pro).
- Capability to obtain and maintain a U. S. security clearance.
Desired Skills:
- Experience in developing or defeating mitigations (ASLR, DEP, N^X).
- Proven ability to bypass common anti-reverse engineering techniques (obfuscation).
- Comprehensive understanding of embedded platforms (FPGA, physical memory).
- Secure implementation of cryptographic primitives (AES-GCM, SHA256, ECDSA).
- Experience with program analysis tools and techniques (control flow, program slicing, taint tracing).
- Effective utilization of automated analysis tools (fuzzers, emulation, sandboxing).
- In-depth knowledge of file systems and formats (ELF, PE, Mach-O).
- Strong communication skills with customers and team members.
- Experience in developing proof-of-concept exploits.
- Active U. S. security clearance.
Zetier is committed to fostering a diverse and inclusive workplace. We are an Equal Opportunity Employer and do not discriminate based on race, religion, color, sex, gender identity, sexual orientation, age, non-disqualifying physical or mental disability, national origin, veteran status, or any other basis protected by law. Employment decisions are based on merit, qualifications, and business needs.

