Role overview
We are looking for an 0-day Research Intern who wants to take their skills to the next level and enjoy being part of a team of passionate engineers and security specialists.
You will have the opportunity to research and find 0-day vulnerabilities in the latest version of software solutions with a focus on web exploitation and over the wire exploits.
This role requires in-depth cybersecurity knowledge. The role will develop a deeper understanding of the latest vulnerabilities and attack techniques. Your work would involve finding 0-day vulnerabilities as well as helping our other technical teams with specialized exploitation knowledge and research of non-standard attack vectors.
We are looking for a long-term fit—someone we can invest in. Optionally, for those inclined, you can also contribute to our blog by writing technical articles about the interesting exploits that were identified.
Requirements
We expect you to have the following:
- Have participated in CTFs, are active in Bug Bounty projects or have completed at least one hard/impossible (or equivalent) box on a CTF platform (e.g. HTB)
- Knowledge on how to exploit common types of vulnerabilities (injection, remote code execution, local file inclusion, directory traversal, memory corruption, etc.)
- A very good understanding of the HTTP protocol and how web applications work/break.
It is a plus if you also:
- Have received one or more CVEs
- Have responsibly disclosed vulnerabilities in a software
- Have previous experience with hacking related personal projects.