Looking for your first real step into vulnerability research? Love reverse engineering things, discovering how they tick, and uncovering the flaws others can’t see? If you’ve got the skills and the passion but are waiting for the right opportunity, this might be it.
Bottom line? You don’t need years of experience in security research to be considered for this role. If you’ve been building your skills, are genuinely curious about security research, and want to be part of a team doing serious, impactful work, keep reading…
What’s this company all about, and why are they worth your consideration? This company does technical security research that counts. No fluff, no boring projects – just cutting-edge work on bespoke tools, software, and systems that are both exclusive and meaningful. You won’t see their work in the public eye, but you will be part of a team solving complex problems and doing fascinating work. With this role, you can work anywhere in Australia, and you’ll earn a base salary up to $120k, aligned with your skills and suitability.
So, what will you actually be doing? You’ll join a tight-knit, collaborative security research team where you’ll:
- Reverse engineer systems and identify vulnerabilities in open and closed-source software.
- Get hands-on with vulnerability research across different technologies.
- Contribute to building tools and software that do some seriously impressive things.
What makes you a great fit for this role? This role is designed for someone with
skills and
potential, even if you don’t have professional experience in security research yet. What’s important is that you can
demonstrate your abilities and a genuine interest in the work. Here’s what they’re looking for:
- You’re an Aussie citizen (a must).
- You’re familiar with different architectures like MIPS, X86_64, ARM, ARM64.
- You’ve played with tools like Ghidra, IDA, Binary Ninja, Radare2, or Hopper.
- You’ve got solid coding foundations – Python, C/C++, Rust, or Java are ideal.
- Most importantly, you can show you’ve got the chops through things like:
- o CVEs you’ve identified.
- o Write-ups, blogs, or projects showcasing your reverse engineering or code review skills.
- o Participation in CTF competitions or similar technical challenges.
Is your interest piqued? Reach out, say hi, and let’s have a chat about YOU. Contact me, Michael, directly on mpearman@decipherbureau.com or apply to this role. Please rest assured anything discussed is kept 100% confidential, and only between you and me.
Decipher Bureau and the clients we partner with are committed to creating a diverse environment and are proud to be equal opportunity employers. All qualified applicants will be considered for employment without attention to race, colour, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status.