At a Glance
- Tasks: Join our team to research vulnerabilities in iOS devices and develop unique extraction capabilities.
- Company: Cellebrite is a global leader in Digital Intelligence, helping protect lives and accelerate justice.
- Benefits: Enjoy remote work flexibility and the chance to contribute to impactful projects.
- Why this job: Be part of a passionate team solving modern digital challenges while aiding law enforcement.
- Qualifications: Must have proven iOS vulnerability research experience and knowledge of advanced exploitation techniques.
- Other info: Ideal for tech enthusiasts eager to make a difference in societal safety.
The predicted salary is between 36000 - 60000 Β£ per year.
Cellebrite's (Nasdaq: CLBT) mission is to enable its customers to protect and save lives, accelerate justice, and preserve privacy in communities around the world. Cellebrite is a global leader in Digital Intelligence solutions for the public and private sectors, empowering organizations to master the complexities of legally sanctioned digital investigations by streamlining intelligence processes. Trusted by thousands of leading agencies and companies globally, Cellebrite's Digital Intelligence platform and solutions transform how customers collect, review, analyze, and manage investigative digital data in legally sanctioned investigations.
Position Overview:
Cellebrite is looking for talented researchers to join the industry's leading digital intelligence Security Research Labs group. As a security researcher in our team, you will be taking part in leading new projects.
Key responsibilities:
- Research on territories with little-explored vulnerability
- Work on the production of world-unique capabilities to extract evidence from phones and other embedded devices.
- Address challenges from a forensics perspective in iPhones and other iOS devices, including hardware-backed encryption (SiDP), secure crypto coprocessor (SEP), and secured boot chain (SecureROM).
- Handle state-of-the-art exploit mitigations in new iPhones such as PAC, KTRR, and PPL.
- Become a member of Labs Group, focusing on Security Research for mobile devices.
- Execute shell code on advanced mobile platforms with challenging mitigations.
- Collaborate with passionate researchers dedicated to solving modern digital intelligence challenges, staying ahead of industry standards.
- Contribute to world-class research that assists law enforcement in lawful evidence extraction, aiding in criminal investigations.
Qualifications:
- Proven vulnerability research experience, preferably in iOS (Must)
- Experience with advanced exploitation techniques
- Knowledge of cryptographic primitives and weaknesses
- Hardware research/board design experience (Advantage)
- Ethical commitment to security research
- Passion for engineering and creating platform-wide native payloads in a fragmented ecosystem
- Strong interest in technology and using skills for societal safety
iOS Researcher (Remote) employer: Cellebrite
Contact Detail:
Cellebrite Recruiting Team
StudySmarter Expert Advice π€«
We think this is how you could land iOS Researcher (Remote)
β¨Tip Number 1
Familiarise yourself with the latest iOS security features and vulnerabilities. Understanding the current landscape of iOS security will not only help you in interviews but also demonstrate your genuine interest in the field.
β¨Tip Number 2
Engage with the security research community online. Join forums, attend webinars, or participate in discussions on platforms like GitHub or Twitter. Networking with professionals in the field can provide insights and potentially lead to referrals.
β¨Tip Number 3
Showcase any personal projects or contributions to open-source security tools related to iOS. Having tangible examples of your work can set you apart from other candidates and highlight your hands-on experience.
β¨Tip Number 4
Prepare for technical interviews by practising problem-solving scenarios related to mobile security. Being able to articulate your thought process and approach to tackling complex challenges will impress interviewers.
We think you need these skills to ace iOS Researcher (Remote)
Some tips for your application π«‘
Understand the Role: Before applying, make sure you fully understand the responsibilities and qualifications required for the iOS Researcher position at Cellebrite. Familiarise yourself with their mission and how your skills align with their needs.
Tailor Your CV: Highlight your relevant experience in vulnerability research, particularly in iOS. Be specific about your technical skills, such as advanced exploitation techniques and knowledge of cryptographic primitives, to demonstrate your fit for the role.
Craft a Compelling Cover Letter: Write a cover letter that showcases your passion for security research and your commitment to ethical practices. Mention any specific projects or experiences that relate to the challenges mentioned in the job description.
Proofread Your Application: Before submitting, carefully proofread your CV and cover letter for any errors or typos. A polished application reflects your attention to detail and professionalism, which is crucial for a role in security research.
How to prepare for a job interview at Cellebrite
β¨Showcase Your Research Experience
Be prepared to discuss your previous vulnerability research projects, especially those related to iOS. Highlight specific challenges you faced and how you overcame them, as this will demonstrate your problem-solving skills and expertise in the field.
β¨Understand the Latest Exploitation Techniques
Familiarise yourself with advanced exploitation techniques and recent developments in iOS security. Being able to discuss these topics will show that you are up-to-date with industry standards and passionate about your work.
β¨Demonstrate Your Ethical Commitment
Cellebrite values ethical commitment in security research. Be ready to articulate your understanding of ethical considerations in digital investigations and how you ensure your work contributes positively to societal safety.
β¨Prepare for Technical Questions
Expect technical questions related to cryptographic primitives, hardware-backed encryption, and exploit mitigations. Brush up on these topics and be ready to explain complex concepts clearly, as this will showcase your depth of knowledge.