A Cyber Red Team Intern will support offensive security and threat emulation efforts by reverse-engineering hardware and software systems, identifying vulnerabilities, and developing proof-of-concept exploits. The role involves applying realistic penetration testing techniques across diverse attack surfaces, analyzing and modeling adversary threats, and building tools to enable reverse engineering and automated vulnerability discovery. Interns will work closely with a multidisciplinary team to debug complex systems, document findings, and communicate technical insights that strengthen overall security posture.
* Reverse-engineer hardware and/or software systems and develop proof-of-concept capabilities exploiting their vulnerabilities
* Apply realistic penetration testing techniques toward a variety of targets
* Analyze and model threats based on various attack surfaces
* Build tools and capabilities to facilitate reverse engineering or automated vulnerability discovery.
* Collaborate in a team environment to reverse engineer, debug, analyze and report findings.
* Currently pursuing an undergraduate degree in Computer Science or related major.
* Competent use of a Linux Environment
* High-level scripting languages, such as Python
* Low-level languages, such as Rust, C, or Assembly
* GDB or another debugger
* Foundational knowledge of exploit development
* Buffer overflows, use-after-free, ROP, etc.
* Computing architecture design, instruction set architectures, and operating system internals
* Memory management(virtual memory, heap/stack)
* Kernel Programming / System Calls
Additional Qualifications:
* Experience with binary reverse engineering tools
* Binwalk
* Ghidra, IDA Pro, Radare2 etc.
* Embedded systems development & debugging
* JTAG/UART debugging
Software Powered by iCIMS
www.icims.com