Posted 1 year ago
The ideal candidate should be experienced in performing in-depth reverse engineering and exploit development on applications and operating systems for mobile devices. We are also looking for Security Researchers who have expertise in firmware revers…
Posted 1 year, 2 months ago
The ideal candidate should be experienced in performing in-depth reverse engineering and exploit development on applications and operating systems for mobile devices. We are also looking for Security Researchers who have expertise in firmware revers…