{"id":1098,"date":"2023-10-20T18:59:58","date_gmt":"2023-10-20T23:59:58","guid":{"rendered":"https:\/\/redbluesecurity.com\/?post_type=awsm_job_openings&#038;p=1098"},"modified":"2024-02-09T10:06:06","modified_gmt":"2024-02-09T16:06:06","slug":"capabilities-developer","status":"publish","type":"awsm_job_openings","link":"https:\/\/redbluesecurity.com\/?awsm_job_openings=capabilities-developer","title":{"rendered":"Capabilities Developer"},"content":{"rendered":"\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-vivid-cyan-blue-color has-alpha-channel-opacity has-vivid-cyan-blue-background-color has-background is-style-wide\" \/>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color\"><strong>Description<\/strong><\/h2>\n\n\n\n<p>At RedBlue Security, we are in search of strong Capabilities Developer to support our clients&#8217; proactive cybersecurity initiatives. This role demands a resourceful individual with a penchant for uncovering zero-day vulnerabilities and creating advanced exploits, with a focus on mobile platforms such as iOS, Android, ARM, or popular web browsers like Chrome, Edge, and Firefox.<\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color\"><strong>Responsibilities<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Conduct thorough research to discover new vulnerabilities (0days) within mobile operating systems and browsers.<\/li>\n\n\n\n<li>Develop and refine sophisticated exploits for identified vulnerabilities.<\/li>\n\n\n\n<li>Maintain a keen understanding of the latest exploit techniques and security trends.<\/li>\n\n\n\n<li>Work closely with cybersecurity teams to integrate exploits into comprehensive security strategies.<\/li>\n\n\n\n<li>Document exploit development processes and findings for technical reports and knowledge sharing.<\/li>\n\n\n\n<li>Participate in collaborative projects and provide insights into vulnerability research and exploitation.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color\"><strong>Requirements<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>TS\/SCI + Full Poly Clearance<\/li>\n\n\n\n<li>Demonstrated experience identifying zero day vulnerabilities and creating proof-of-concept exploits&nbsp;<\/li>\n\n\n\n<li>Experience with Android\/iOS internals&nbsp;<\/li>\n\n\n\n<li>Experience using C\/C++, Python, assembly, or other scripting languages&nbsp;<\/li>\n\n\n\n<li>Familiarity with at least one common low-level architecture&nbsp;<\/li>\n\n\n\n<li>Experience reverse engineering (IDA Pro, GHIDRA,&nbsp;WinDdg, Binary Ninja etc.)&nbsp;<\/li>\n\n\n\n<li>Familiarity with modern exploit mitigation techniques and counter-measures&nbsp;<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color\"><strong>The Ideal Candidate<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Experience developing covert applications and Command and Control (C2) techniques&nbsp;<\/li>\n\n\n\n<li>Developed customized fuzzing tools&nbsp;<\/li>\n\n\n\n<li>Ability to demonstrate common rooting and hooking techniques&nbsp;<\/li>\n\n\n\n<li>Active participation in Capture the Flag (CTF) or other software hacking competitions&nbsp;<\/li>\n<\/ul>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>To apply, please submit your resume along with a cover letter explaining your exploit development experience, particularly any public CVEs or security advisories you have contributed to, to apply@redbluesecurity.com<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n","protected":false},"excerpt":{"rendered":"<p>Description At RedBlue Security, we are in search of strong Capabilities Developer to support our clients&#8217; proactive cybersecurity initiatives. This role demands a resourceful individual with a penchant for uncovering zero-day vulnerabilities and creating advanced exploits, with a focus on mobile platforms such as iOS, Android, ARM, or popular web browsers like Chrome, Edge, and [&hellip;]<\/p>\n","protected":false},"author":1,"template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"class_list":["post-1098","awsm_job_openings","type-awsm_job_openings","status-publish","hentry","job-type-full-time","job-location-maryland","clearance-ts-sci-ci-poly","salary-200000-250000"],"_links":{"self":[{"href":"https:\/\/redbluesecurity.com\/index.php?rest_route=\/wp\/v2\/awsm_job_openings\/1098","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/redbluesecurity.com\/index.php?rest_route=\/wp\/v2\/awsm_job_openings"}],"about":[{"href":"https:\/\/redbluesecurity.com\/index.php?rest_route=\/wp\/v2\/types\/awsm_job_openings"}],"author":[{"embeddable":true,"href":"https:\/\/redbluesecurity.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"wp:attachment":[{"href":"https:\/\/redbluesecurity.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1098"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}