Expanding capabilities

HIRING

We have an experienced team of experts,
but we are always looking for talent.

Positions

title
Status
 
Web Browser Vulnerability Researcher OPEN
Web Browser Vulnerability Researcher

Exodus Intelligence is searching for individuals passionate about vulnerability discovery, reverse engineering, and exploit development to join our Browser team.

This position is open to applicants world-wide and does not require relocation.

JOB RESPONSIBILITIES

This role would be responsible for discovering and exploiting vulnerabilities affecting web-browsers. The work includes attack vector enumeration, static and dynamic analysis of the target, reverse engineering, debugging, identification of vulnerabilities, exploitation, and technical documentation.

REQUIRED QUALIFICATIONS

We do not require any formal education or certifications.

Qualified candidates should have the following:

  • Fluent in Intel and/or ARM assembly, C/C++ and Javascript code
  • Demonstrated ability to discover and exploit 0day vulnerabilities in modern web browsers
  • Understanding of latest memory corruption mitigations
  • Competency with debuggers and IDA Pro
PREFERRED QUALIFICATIONS

Candidates possessing the following will be given preferential consideration:

  • A thorough understanding of modern web browser internals
  • A thorough understanding of a wide range of vulnerability classes
  • A history of publishing or presenting original research -OR- references for production grade exploit development
BENEFITS

We offer highly competitive base salary, variable bonuses on every project, and a flexible work schedule.

APPLY
Mobile Vulnerability Researcher OPEN
Mobile Vulnerability Researcher

Exodus Intelligence is searching for individuals passionate about vulnerability discovery, reverse engineering, and exploit development to join our Mobile team.

This position is open to applicants world-wide and does not require relocation.

JOB RESPONSIBILITIES

This role would be responsible for discovering and exploiting vulnerabilities affecting Mobile devices. The work includes attack vector enumeration, static and dynamic analysis of the target, reverse engineering, debugging, identification of vulnerabilities, exploitation, and technical documentation.

REQUIRED QUALIFICATIONS

We do not require any formal education or certifications.

Qualified candidates should have the following:

  • Fluent in C/C++ and ARM and Intel assembly (Hexagon and MIPS are also accepted)
  • Demonstrated ability to discover and exploit 0day vulnerabilities in mobile devices
  • Understanding of latest memory corruption mitigations
  • Competency with debuggers and IDA Pro
PREFERRED QUALIFICATIONS

Candidates possessing the following will be given preferential consideration:

  • Ability to develop SoC exploits without a debugger and minimal runtime information
  • A thorough understanding of Mobile attack surface (e.g., CP, AP, and other areas)
  • A thorough understanding of a wide range of vulnerability classes
  • A history of publishing or presenting original research -OR- references for production grade exploit development
BENEFITS

We offer highly competitive base salary, variable bonuses on every project, and a flexible work schedule.

APPLY
Zero-Day Vulnerability Researcher OPEN
Zero-Day Vulnerability Researcher

Exodus Intelligence is searching for individuals passionate about vulnerability discovery, reverse engineering, and exploit development to join our 0day team. This position is ideal for researchers who want flexibility in their target selection and prefer not specialize in a specific product category (e.g., Mobile or Browsers).

This position is open to applicants world-wide and does not require relocation.

JOB RESPONSIBILITIES

This role would be responsible for discovering and exploiting vulnerabilities affecting modern operating systems, market leading enterprise and consumer products. The work includes attack vector enumeration, static and dynamic analysis of the target, reverse engineering, debugging, identification of vulnerabilities, exploitation, and technical documentation.

REQUIRED QUALIFICATIONS

We do not require any formal education or certifications.

Qualified candidates should have the following:

  • Fluent in C/C++ and at least one of: Intel, ARM, or MIPS assembly code
  • Demonstrated ability to discover and exploit 0day vulnerabilities in modern operating systems and market leading enterprise and consumer products
  • Understanding of latest memory corruption mitigations
  • Competency with debuggers and IDA Pro
PREFERRED QUALIFICATIONS

Candidates possessing the following will be given preferential consideration:

  • A thorough understanding of computer systems and the ability to reverse without the availability of prior published work
  • A thorough understanding of a wide range of vulnerability classes
  • A history of publishing or presenting original research -OR- references for production grade exploit development
BENEFITS

We offer highly competitive base salary, variable bonuses on every project, and a flexible work schedule.

APPLY