At a Glance
- Tasks: Conduct advanced vulnerability research and collaborate on innovative security solutions.
- Company: Join a leading cybersecurity firm focused on cutting-edge technology.
- Benefits: Attractive salary, flexible work options, and opportunities for professional growth.
- Why this job: Make a real impact in cybersecurity while working with the latest tools and technologies.
- Qualifications: 5+ years in cybersecurity, strong reverse engineering skills, and a passion for problem-solving.
- Other info: Dynamic team environment with excellent career advancement potential.
The predicted salary is between 48000 - 72000 £ per year.
Overview
We are seeking a dedicated vulnerability researcher to engage in advanced vulnerability analysis and research, addressing the complex demands of our mission. In this role, you will work closely with fellow researchers and defense teams to identify vulnerabilities and develop cutting-edge solutions. The ideal candidate will be self-motivated, possess extensive technical curiosity, and have a strong background in reverse engineering. You will thrive in a collaborative environment, working on challenging targets to enhance our security posture.
Responsibilities
- Design and execute testing and simulations – such as penetration tests, technical controls assessments, cyber exercises, or resiliency simulations, and contribute to the development and refinement of assessment methodologies, tools, and frameworks to ensure alignment with the firm\\\’s strategy and compliance with regulatory requirements
- Evaluate controls for effectiveness and impact on operational risk, as well as opportunities to automate control evaluation
- Collaborate closely with cross-functional teams to develop comprehensive assessment reports – including detailed findings, risk assessments, and remediation recommendations – making data-driven decisions that encourage continuous improvement
- Utilize threat intelligence and security research to stay informed about emerging threats, vulnerabilities, industry best practices, and regulations. Apply this knowledge to enhance the firm\\\’s assessment strategy and risk management. Engage with peers and industry groups that share threat intelligence analytics
- Conduct in-depth vulnerability research and exploit development across a broad range of software on modern operating systems, edge devices, on-premise, and open-source software.
- Reverse engineer binaries using tools such as IDA Pro, Ghidra, or Binary Ninja to identify novel attack surfaces and develop proof-of-concept exploits.
- Use common VR toolsets such as Fuzzers, disassemblers, debuggers, and code browsers for static and dynamic analysis.
- N-Day vulnerability analysis, patch diffing, and zero-day vulnerability research.
- Collaborate with other teams to share findings, support vulnerability triage, patch prioritization, and IOCs sharing, supporting the firm\\\’s mission requirements.
- Document research findings, proof-of-concepts, and technical workflows.
- 5+ years of experience in cybersecurity or resiliency, with demonstrated exceptional organizational skills to plan, design, and coordinate the development of offensive security testing, assessments, or simulation exercises
- Track record of discovered vulnerabilities (CVEs) in high-profile targets in at least one of the following environments: operating systems, mobile devices, web applications, browsers.
- Proven hands-on experience in vulnerability research and PoC/exploit development, reporting, and mitigating security vulnerabilities in open-source projects.
- Expertise in advanced analysis frameworks leveraging symbolic execution techniques and dynamic binary instrumentation to uncover, triage, and exploit complex software vulnerabilities.
- Hands-on proficiency exploiting complex vulnerability classes – including user-after-free, double free, type confusion – and applying advanced exploitation techniques such as heap spraying and controlled memory corruption to achieve reliable code execution.
- Strong understanding of at least two operating systems internals throughout user mode and kernel mode (Microsoft Windows, GNU/Linux, Android, MacOS, or iOS).
- Experience auditing large C/C++, Java, and .Net codebases combining automated static analyzers with manual review to trace data and control flow, uncover memory-safety, injection, and deserialization vulnerabilities and produce proof-of-concept code.
- Extensive reverse engineering expertise on x86/x64 and ARM/ARM64 binaries, employing IDA Pro, Ghidra, Binary Ninja, WinDbg, GDB, and RR for deep static/dynamic analysis and root cause vulnerability discovery.
- Knowledge of US financial services sector cybersecurity or resiliency organization practices, operations risk management processes, principles, regulations, threats, risks, and incident response methodologies
- Ability to identify systemic security or resiliency issues as they relate to threats, vulnerabilities, or risks, with a focus on recommendations for enhancements or remediation, and proficiency in multiple security assessment methodologies (e.g., OWASP Top Ten, NIST Cybersecurity Framework), offensive testing tools, or resiliency testing equivalents
- Excellent communication, collaboration, and report writing skills, with the ability to influence and engage stakeholders across various functions and levels, Bachelor\\\’s degree in computer science, or PhD in a related technical field, or an equivalent combination of education and/or experience in a related field.
- 5+ years of experience in exploit research and development.
- Experience using Fuzzing tools such as LibFuzzer, LibAFL, AFL++, OSS-Fuzz, Syzkaller and program analysis tools such as LLVM, Angr, KLEE, Intel Pin, DynamoRIO, and Frida.
- Experience emulating embedded platforms for live debugging.
- Kernel and low-level OS development.
- Deep Linux internals knowledge (SELinux, AppArmor, Seccomp, eBPF, containers, VMs).
- Deep Windows internals knowledge (KASLR, DSE, SSDT, IDT, SMEP, SMAP, PXN, KPP, KDP, VBS, HVCI, KMCI, UMCI).
#J-18808-Ljbffr
Vulnerability Researcher employer: JPMorgan Chase & Co.
Contact Detail:
JPMorgan Chase & Co. Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Vulnerability Researcher
✨Tip Number 1
Network like a pro! Attend cybersecurity meetups, conferences, or online webinars. Engaging with fellow researchers and industry experts can open doors to opportunities that aren’t even advertised.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your vulnerability research projects, proof-of-concept exploits, and any CVEs you've discovered. This will give potential employers a taste of what you can bring to the table.
✨Tip Number 3
Don’t just apply; engage! When you find a role that excites you, reach out to current employees on LinkedIn. Ask them about their experiences and share your passion for vulnerability research. It’s a great way to get noticed!
✨Tip Number 4
Keep learning and stay updated! Follow the latest trends in cybersecurity, especially around vulnerabilities and exploits. This knowledge will not only help you in interviews but also show your commitment to the field.
We think you need these skills to ace Vulnerability Researcher
Some tips for your application 🫡
Show Off Your Skills: When you're writing your application, make sure to highlight your technical skills and experience in vulnerability research. We want to see how your background aligns with the role, so don’t hold back on showcasing your expertise in reverse engineering and exploit development!
Tailor Your Application: Take a moment to tailor your application specifically for this role. Use keywords from the job description to demonstrate that you understand what we’re looking for. This shows us that you’re not just sending out generic applications but are genuinely interested in joining our team.
Be Clear and Concise: While we love detail, clarity is key! Make sure your application is well-structured and easy to read. Use bullet points where necessary to break down your achievements and experiences, making it easier for us to see why you’d be a great fit.
Apply Through Our Website: Don’t forget to apply through our website! It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it gives you a chance to explore more about our company and culture while you’re at it!
How to prepare for a job interview at JPMorgan Chase & Co.
✨Know Your Tools Inside Out
Make sure you’re well-versed in the tools mentioned in the job description, like IDA Pro, Ghidra, and various fuzzing tools. Be prepared to discuss your hands-on experience with these tools and how you've used them in past projects.
✨Showcase Your Research Skills
Bring examples of your previous vulnerability research or exploit development work. Discuss specific vulnerabilities you've discovered, how you approached the analysis, and the impact of your findings. This will demonstrate your technical curiosity and problem-solving skills.
✨Collaborate and Communicate
Since this role involves working closely with cross-functional teams, be ready to talk about your collaboration experiences. Share examples of how you’ve effectively communicated complex technical information to non-technical stakeholders, as this is crucial for success in the role.
✨Stay Updated on Trends
Familiarise yourself with the latest trends in cybersecurity and emerging threats. Be prepared to discuss how you keep your knowledge current and how you would apply this knowledge to enhance the firm’s assessment strategy and risk management.