Your Browser is Not Supported
To ensure jobstore run smoothly, please use the latest version of the following supported browsers:
We are seeking talented and passionate individuals to join our Offensive Security team! This position has a strong focus on discovering unknown vulnerabilities in systems and devices.
This position will be based in Singapore, but remote work is possible for the right candidate.
We regret to inform that only shortlisted candidates will be notified
In this role, you will discover, evaluate and exploit new vulnerabilities in software applications, modern operating systems and hardware devices. There are no standard methodologies although typical activities include enumeration of attack surfaces, source code review, binary reverse engineering, custom tools development and debugging. Unorthodox methods such as following your gut instincts, and not shaving until you find the unicorn vulnerability are also acceptable. Finally, you will provide technical documentation and proof-of-concept code.
Candidates should have the following:
Candidates possessing the following will be given preferential consideration:
Official account of Jobstore.
NVIDIA is looking for security researchers passionate about offensive research across different platforms. Do you have experience with identifying hardware and software vulnerabilities, developing PoC, and tools for automation in vulnerability research? Are you creative and devious in your offensive approach? We want to hear from you!
You should demonstrate ability to excel in an environment with innovative and fast paced development on the worlds most powerful integrated software and hardware computing platform.
What you’ll be doing:
Core job duties will identify vulnerabilities in our embedded firmware and critical system software, building proof of concepts, and collaborating with development teams to remediate them.
Candidates will invest in improving current tools and offensive practices for bug discovery and evaluation while supporting remediation efforts. We expect team members to exercise modern tools for modeling new attack vectors on unreleased and emerging technology platforms.
The most impactful candidates can simulate real attacker behaviors, break systems by exploiting design assumption and effectively communicate their findings for action. Focus will be to increase resilience of the end products against all forms of attack through close collaboration with extended SW and HW offensive security teams.
Products targets span HPC data centers, consumer electronics, autonomous platforms, AI/cloud solutions, and a variety of embedded/IOT platforms providing a rich and complex target space to exercise your skills.
What we need to see:
We'd like to see proven experience and offensive security research (CVE’s, publications, patents, tools) with responsible disclosure practices.
Strong skills in reverse engineering and automation (IDA, Ghidra), fuzzing (AFL, WinAFL, Syzcaller) and exploitation (ROP, memory corruption) are important to success; as well as understanding of modern embedded cryptography and common security issues.
Experience with ARM/X86/RISCV assembly (include shellcode development) and low-level C programming paired with understanding and experience with micro-architectural attacks (side channels, fault injection, etc) is critical.
Demonstrated skill for secure code reviews of complex source projects, and exposure to code quality practices (SDL, threat modeling) that support development goals.
Candidates should be comfortable working collaboratively and remotely with others to accomplish complex team goals, enabling delivery of outstanding security for our products.
BS/BA degree or equivalent experience
8+ years in a security related field
Ways to stand out from the crowd:
Navigating complex platform concerns and ability to analyze composed systems to identify high risk components and established testing targets and objectives.
Practical skills using Hex-Rays IDA Pro and plugin/loaders development (or similar experience with Ghidra) is valuable as well as experience with enclave models such as ARM TEE, Intel SGX/TDX, AMD SEV-SNP and other isolation technologies.
Development and integration of AI tooling and skills to accelerate and improve activities and or experience with offensive actions targeting AI models (LLM or other) components within those platforms.
Experience using any of the common binary instrumentation frameworks and/or working with LLVM IR and Clang plugins, or fuzzing to aid at scale analysis.
NVIDIA has continuously reinvented itself over two decades. Our invention of the GPU in 1999 fueled the growth of the PC gaming market, redefined modern computer graphics, and revolutionized parallel computing. More recently, GPU deep learning ignited modern AI — the next era of computing. NVIDIA is a “learning machine” that constantly evolves by adapting to new opportunities that are hard to solve, that only we can pursue, and that matter to the world. This is our life’s work, to amplify creativity and intelligence. Make the choice to join us today!
The base salary range is 220,000 USD - 419,750 USD. Your base salary will be determined based on your location, experience, and the pay of employees in similar positions.You will also be eligible for equity and benefits. NVIDIA accepts applications on an ongoing basis.
Official account of Jobstore.
THIS IS A NON-CIVIL SERVICE POSITION
BALTIMORE CONVENTION CENTER
Intern - Public Art & Building History Researcher/Archivist
Part-Time 20-30 hrs./wk. Salary $ 15.00/hr.
GENERAL DESCRIPTION OF THE POSITION:
The Baltimore Convention Center wishes to research and then produce thorough documentation surrounding its public art collection. This will include reviewing archival documentation, researching artists and their works, interviewing pertinent stakeholders, and producing documents that will be used to create content for the organization’s website and self-guided tours.
Additionally, as the Convention Center will be celebrating its 50th anniversary in 2029, the Intern will start to identify historic photos and documents from within the city and agency archives and propose a list of assets that should be digitized in preparation for a retrospective.
Interns at the Baltimore Convention Center are hired with a specific set of tasks or project in mind. The goal is to create meaningful job experiences for the student while providing the agency tangible outcomes that leave lasting impact. The position will work closely with all departments, as well as relevant entities to further the assigned work such as the Baltimore City Archives and the Baltimore Office of Promotion and the Arts
The Intern is a part-time hourly position that will report to leadership within the Sales, Services, and Marketing Department.
Incumbents receive moderate supervision from a technical superior. Employees in this class work a conventional workweek averaging 20-30 hours a week. The work of this position takes place in a predominantly seated work location but will require occasional walking, bending, and lifting items no more than 50lbs. Occasional offsite visits to pertinent locations will be required, however a personal vehicle is not required.
TYPICAL EXAMPLES OF THE WORK:
(The following examples illustrate the work performed in the positions in the class. Positions may require some or all these examples depending on the organization of work within the agency. This list is not inclusive. A position may require related duties not listed, if necessary, to accomplish the work of the agency.)
Review archival documentation surrounding the history of public art at the Baltimore Convention Center and culminate pertinent information to summarize their research.
Identify and research pertinent artists and their works as it relates to the agency’s collection. This may include contacting the artist or their representative on behalf of the agency. interviewing pertinent stakeholders and producing documents that will be used to create content for the organization’s website and self-guided tours.
Engaging the management and curatorial teams at the Baltimore Office of Promotion and the Arts to align agency information with that of the City’s public art collection records.
Work alongside the agency’s marketing department to design web content surrounding the Center’s public art.
Identify relevant photos and documents from within the city and agency archives to the creation and operation of the BCC since its opening in 1979.
Propose a list of archival items that should be digitized in preparation for a retrospective.
Performs related work as required.
REQUIRED KNOWLEDGE, SKILLS, AND ABILITIES
Basic computer skills to include Microsoft Office applications.
Ability to demonstrate examples of the following:
MINIMUM EDUCATION AND EXPERIENCE REQUIREMENTS:
Requirements – Current enrollment in a 2- or 4-year undergraduate program or pursuing a master’s degree. While not required, a focus of studies surrounding library sciences, art or art curation, or marketing/communications is preferred.
LICENSES, REGISTRATIONS AND CERTIFICATES:
N/A
Official account of Jobstore.
Are you a cybersecurity and/or AI researcher who enjoys a challenge? Are you excited about pioneering new research areas that will impact academia, industry, and national security? If so, we want you for our team, where you’ll collaborate to deliver high-quality results in the emerging area of AI security.
The CERT Division of the Software Engineering Institute (SEI) is seeking applicants for the AI Security Researcher role. Originally created in response to one of the first computer viruses -- the Morris worm – in 1988, CERT has remained a leader in cybersecurity research, improving the robustness of software systems, and in responding to sophisticated cybersecurity threats. Ensuring the robustness and security of AI systems is the next big challenge on the horizon, and we are seeking life-long learners in the fields of cybersecurity, AI/ML, or related areas, who are willing to cross-train to address AI Security.
The Threat Analysis Directorate, is a group of security experts focused on advancing the state of the art in AI security at a national and global scale. Our tasks include vulnerability discovery and assessments, evaluation of the effectiveness and robustness of AI systems, exploit discovery and reverse engineering, and identifying new areas where security research is needed. We participate in communities of network defenders, software developers and vendors, security researchers, AI practitioners, and policymakers.
You'll get a chance to work with elite AI and cybersecurity professionals, university faculty, and government representatives to build new methodologies and technologies that will influence national AI security strategy for decades to come. You will co-author research proposals, execute studies, and present findings and recommendations to our DoD sponsors, decision makers within government and industry, and at academic conferences. The SEI is a non-profit, federally funded research and development center (FFRDC) at Carnegie Mellon University.
What you’ll do:
Who you are:
You are able to:
Why work here?
Location
Pittsburgh, PAJob Function
Software/Applications Development/EngineeringPosition Type
Staff – RegularFull Time/Part time
Full timePay Basis
SalaryMore Information:
Please visit “Why Carnegie Mellon” to learn more about becoming part of an institution inspiring innovations that change the world.
Click here to view a listing of employee benefits
Carnegie Mellon University is an Equal Opportunity Employer/Disability/Veteran.
Official account of Jobstore.
SHIELD is a device-first risk intelligence company. We are dedicated to helping organizations worldwide eliminate fake accounts and all malicious activity. Leveraging AI, we identify the root of fraud with the SHIELD Device ID and provide actionable risk intelligence in real time, helping all online businesses stop fraud, build trust, and drive growth. With offices in San Francisco, Miami, London, Berlin, Jakarta, Bengaluru, Beijing, and Singapore, we are rapidly achieving our mission - eliminating unfairness to enable trust for the world.
Responsibilities
As a Security Researcher (JavaScript), you will focus on researching advanced Web Applications protection mechanisms that include client-side runtime execution protection and data and DOM integrity verification. We are looking for motivated and skilled researchers with deep knowledge in Web/application security to work on advancing our technology and solution capabilities.
Official account of Jobstore.
Official account of Jobstore.
The Sr. Security Researcher will report to Sr. Manager, Security Research. The Security Researcher will be primarily responsible for working on different cyber-security specific research projects, performing malware analysis (static and dynamic) and develop protection to prevent them, extract and analyze Indicators-Of-Compromise and come-up with new detection techniques.
ThreatLabZ is the security research arm of Zscaler. This world-class team is responsible for hunting new threats and ensuring that the 15 million users on the global Zscaler platform are always protected. In addition to malware research and behavioral analysis, team members are involved in the research and development of new prototype modules for advanced threat protection on the Zscaler platform, and regularly conduct internal security audits to ensure that Zscaler products and infrastructure meet security compliance standards. ThreatLabZ regularly publishes in-depth analyses of new and emerging threats on its portal, research.zscaler.com.
Responsibilities/What You’ll Do:
Official account of Jobstore.
Are you a cybersecurity and/or AI researcher who enjoys a challenge? Are you excited about pioneering new research areas that will impact academia, industry, and national security? If so, we want you for our team, where you’ll collaborate to deliver high-quality results in the emerging area of AI security.
The CERT Division of the Software Engineering Institute (SEI) is seeking applicants for the AI Security Researcher role. Originally created in response to one of the first computer viruses -- the Morris worm – in 1988, CERT has remained a leader in cybersecurity research, improving the robustness of software systems, and in responding to sophisticated cybersecurity threats. Ensuring the robustness and security of AI systems is the next big challenge on the horizon, and we are seeking life-long learners in the fields of cybersecurity, AI/ML, or related areas, who are willing to cross-train to address AI Security.
The Threat Analysis Directorate, is a group of security experts focused on advancing the state of the art in AI security at a national and global scale. Our tasks include vulnerability discovery and assessments, evaluation of the effectiveness and robustness of AI systems, exploit discovery and reverse engineering, and identifying new areas where security research is needed. We participate in communities of network defenders, software developers and vendors, security researchers, AI practitioners, and policymakers.
You'll get a chance to work with elite AI and cybersecurity professionals, university faculty, and government representatives to build new methodologies and technologies that will influence national AI security strategy for decades to come. You will co-author research proposals, execute studies, and present findings and recommendations to our DoD sponsors, decision makers within government and industry, and at academic conferences. The SEI is a non-profit, federally funded research and development center (FFRDC) at Carnegie Mellon University.
What you’ll do:
Who you are:
You are able to:
Why work here?
Location
Pittsburgh, PAJob Function
Software/Applications Development/EngineeringPosition Type
Staff – RegularFull Time/Part time
Full timePay Basis
SalaryMore Information:
Please visit “Why Carnegie Mellon” to learn more about becoming part of an institution inspiring innovations that change the world.
Click here to view a listing of employee benefits
Carnegie Mellon University is an Equal Opportunity Employer/Disability/Veteran.
Official account of Jobstore.