— 2+ years of hands-on experience with white and black box software penetration testing and vulnerability assessment
— understanding of typical software security issues (memory corruptions, various injections, arithmetic overflows, etc.) and how to protect against them
— good experience with C/C++, scripting languages, assembly (Arm preferred)
— ability to document and describe discovered security issues
Optional Requirements:
— exploitation experience
— understanding of Linux security architecture and design flaws exploitation (privilege escalation, MAC/DAC Passover oth.).
— Rust language knowledge
— tools: experience with fuzzers, disassemblers, debuggers, assessment automation tools