Exploit Developer
We’re searching for Exploit to support the client’s tactical and strategic approaches for mission and ways forward.
Exploits: Remote/Sandbox (Exploit Developer)
Vulnerability Analysis
JavaScript development
ARM/AARCH64 Assembly development experience
C Programming experience
Low-level operating systems experience for Android (Could be Linux background)
Reverse Engineering (Using tools such as IDA Pro, Binary Ninja and Ghidra)
In depth knowledge of V8, JIT, WebKit
In depth knowledge of exploit mitigations such as ASLR, DEP, ROP
REQUIREMENTS
Minimum 2 years performing above referenced duties
Must be a US Citizen with TS/SCI Clearance prefered, possibly Secret Clearance.
Must have a Bachelor Degree in computer science, computer engineering, math, or a related field.
LOCATION
In Laurel, Maryland area
GRIMM offers security engineering and consulting services, backed by the research and development, to deliver the art of the possible in cybersecurity. We specialize in breaking things, discovering vulnerabilities, and demonstrating impact to solve complex cybersecurity problems.
GRIMM services government and commercial clients from a diverse range of industries. We work in hardware, firmware, and software across traditional enterprise computing, embedded devices, automobiles, planes, drones, energy, and mobile.
This is not your ordinary company! This is a collection of the best people in cybersecurity that you have likely never encountered in one place.
GRIMM is a team of industry leaders, which includes the largest number of DEF CON CTF Black Badge holders in a single company. We are looking for people at all levels, with a passion for cybersecurity who want to help grow and shape the industry.
We promote a Drug-Free Workplace, are an Equal Opportunity Employer (EOE) and Affirmative Action Employer.
Visit our career site at www.grimm-co.com/careers