At InnoEdge, we work with organisations to protect them from cyber threats. We help detect new unknown cyber threats through research, fortify networks, and defend critical information infrastructures. Based in Singapore, our team consists of cybersecurity experts who use the advanced techniques and technologies to deliver cutting-edge solutions and services.
InnoEdge believes in fostering a culture where team members are encouraged to overcome challenges, explore new ideas, and work together to succeed. We value individuals who are determined to push beyond the boundaries, and have a thirst for knowledge, continuous learning, and self-improvement.
Collaboration is key to our success. We prioritise open communication, constructive feedback, and a willingness to help others. We are committed to creating a supportive work environment that encourages excellence, innovation, and continuous improvement. We're looking for individuals who share our values and are excited to join us on our cyber mission.
Responsibilities
- Perform deep research into selected applications to understand how they are designed and implemented.
- Reverse engineer or apply static and/or dynamic analysis techniques on closed source binaries to understand it’s inner workings.
- Identify weakness in systems or software that makes it possible for an attacker to abuse.
- Develop proof of concept to demonstrate the severity of the discovered vulnerability and propose mitigations.
- Develop cutting edge tools to improve and scale up the analysis process.
- Keep abreast of the latest research into application security research and reverse engineering techniques.
Minimum Qualifications:
- Diploma/bachelor’s in a computing related field or relevant practical experience
- Software development experience in a general-purpose programming language for instance, Python
- Proficiency in C/C++, assembly (x86/64)
For a more senior role, we're looking for candidates who have:
- Competency in debugging, binary reverse engineering, bypassing of anti-RE and anti-debugging techniques.
- Experience in recognizing common algorithms and patterns (in line hashing function, obfuscator) in decompiled code and ability to perform type recovery on simple to intermediate data structures.
- Ability to apply public research materials to recover file format or encoded binaries.
- Participation in public disclosure of vulnerabilities, bug bounty programs or capture the flag (CTF) competitions.
If you meet these qualifications and are passionate about cyber security, we encourage you to apply for this exciting opportunity. We offer competitive compensation, a comprehensive benefits package, and a collaborative and dynamic work environment.