Offensive Security Researcher - Fuzzing & Tooling
As part of Apple's Security Engineering & Architecture (SEAR) organization, you'll join our mission to create the world's most secure products. We are committed to creating groundbreaking tools that enable our security researchers to delve deep into our codebases and identify critical vulnerabilities.
We are seeking a motivated individual to explore and improve our offensive security capabilities with a strong emphasis on designing, developing, and improving state-of-the-art fuzzing research.
You will collaborate with a team of security researchers in order to gain a deep understanding of the attack surface and define strategies for securing every layer of our products. Your focus on efficient fuzzing combined with the expertise of security researchers will be crucial in protecting our products from attackers.
Your creativity will also drive research in advanced fuzzing techniques. Crafting novel ways to fuzz deeper in codebases, designing custom fuzzing engines, inventing new feedback metrics or sanitizers. These innovations will originate from your research and ultimately will be applied at scale.
Our scope of responsibility is full stack, including silicon, boot ROMs, kernels, and user applications.
- Strong fuzzing expertise (applied fuzzing, fuzzing research, fuzzing technologies)
- Strong programming skills (C/C++/Python/ASM)
- Autonomous drive and collaborative mindset
- Experience with compilers / LLVM
- Understanding of Vulnerability Research, Static and Dynamic analysis techniques
- Reverse Engineering