IBM Security Researcher in San Jose, California Introduction At IBM, work is more than a job - it's a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do something better, but to attempt things you've never thought possible. Are you ready to lead in this new era of technology and solve some of the world's most challenging problems? If so, let's talk. Your Role and Responsibilities At IBM, we help defenders continuously assess their real-world security. Our Adversary Services offering provides an experience designed to mirror today's advanced adversaries, not yesterday's threats. We partner with security teams to help them understand the art of the possible by delivering an unrivaled attack experience, at scale. As a security researcher on X-Force's new Offensive Research group (XOR), you will engage in cutting-edge offensive security research, harnessing AI alongside X-Force's advanced methodologies and capabilities. You will work with our team of expert researchers to ensure that X-Force remains at the forefront of red teaming innovation, while also producing public research that enhances our visibility in the field. You'll be responsible for inventing clever ways to breach customer networks and bypass security controls, by finding and exploiting vulnerabilities in widely used software and hardware. You'll work alongside our offensive engineers, researchers, and developers to drive those innovations throughout our toolsets and across our customers. Simulating sophisticated threat actors takes industry-leading offensive research, advanced capabilities, and mature methodology. We believe offensive security research is essential for both simulating various sophistication levels of threat actors and enabling defenders to better understand, defend, and respond to attacks. IBM X-Force has built its reputation in the industry by setting the standard for compelling offensive security research. X-Force members regularly present research at the top security conferences in the world. Responsibilities of the Role: Solving problems that do not have known solutions Perform in-depth analysis and research to uncover exploitable vulnerabilities in widely used systems and products. Create proof-of-concept exploits to illustrate the possible impact of zero-day vulnerabilities. Help develop offensive tooling and frameworks Design tools and scripts to streamline reverse engineering tasks and increase efficiency Help design forward-thinking security research projects to best meet team goals Thoroughly document and record research findings Publish written research and present at notable security conferences Incorporate feedback loops with peers on offensive research and tooling Help develop methodologies for leveraging AI in vulnerability research and reverse engineering Stay informed about the latest advancements in vulnerability research Provide guidance and offense-related insights throughout IBM on AI technologies Required Technical and Professional Expertise Proficient in binary analysis using a reverse engineering platform such as IDA Pro, Ghidra, or Binary Ninja Proficient in dynamic analysis using debuggers (WinDbg, gdb) Proficient in reading and writing assembly (x64, ARM) Deep understanding of low-level operating system internals Track record in vulnerability research and CVE assignments Development Experience: 5+ years coding in two or more programming languages (Python, C#, C/C++, Rust) Experience with software version control systems such as git Experience with packet capture (Wireshark) and network protocols analysis Ability to collaborate effectively with team members Strong written and verbal communication skills in English Strong creative problem-solving skills Demonstrated experience finding vulnerabilities in widely used software Familiarity with common vulnerability classes and their corresponding exploitation techniques Experience reverse engineering closed source software Experience developing offensive tooling or frameworks Preferred Technical and Professional Expertise BA/BS in an Infosec related major or commensurate practical experience Experience with kernel driver development (WDK/lkm) History of developing open-source software for the security community History of presenting at security conferences Experience leveraging AI for offensive security research Experience with offensive use of generative AI and large language models Experience supporting Red Team Operators through development of tooling Knowledge of EDR detection capabilities and associated evasion techniques for behavioral based alerting Prior security consulting experience #J-18808-Ljbffr IBM Computing
...the AKA Tree Service team at our Hermitage, TN location! We are looking for hard-working, dedicated individuals. A successful Sales Arborist has a strong work ethic and is a self-starter who enjoys interacting with the public and our employees. Must have knowledge of...
Sogeti USA Cincinnati is looking for User Interface (UI) / (UX) Design Experience .Detailed and practical understanding of best practices in User Experience DesignUser Experience (UX) ExpertiseModern Web Design ExperienceExcellent Visual Design SkillsPortfolio...
...Senior Underwriter - UW08CA Underwriter - UW08CB We're determined to make a difference and are proud to be an insurance company that... ...,320 -$144,840 Location: This role can have a Hybrid or Remote work arrangement. Candidates who live near our Chicago or...
...more than 50 local agencies and franchises to set high standards of care for older adults across the country.\n \n Job Description\n \n... ...care that helps our clients stay healthy, safe, and happy at home.\n \n \n We really appreciate the hard work our Care Professionals...
...Job Description Job Description Job Title: Machine Operator - Cable Print & Spooler Job Description: Trystar is a leader in power distribution equipment and related services at the heart of supporting our electrical infrastructure. Our team members focus on...