Apple's Security Engineering & Architecture organization is responsible for the security of all Apple products. Passionate about safeguarding our users, we believe that the best defense requires a phenomenal offense. When it comes to securing more than a billion devices running the world's most sophisticated operating systems, that means finding vulnerabilities first. Can you make a difference on this scale? Join our extraordinary team of security researchers and help protect all Apple users.
Description
Safari, Mail or Messages. Evaluating the security of iOS and macOS kernels, boot ROMs, firmware and hardware are all included in the scope of the team. Working alongside a wide variety of teams and vendors, your influence will be felt throughout Apple's products such as the iPhone, iPad, Mac and Apple TV. As a member of the team, one of your main responsibilities will be to conduct vulnerability research on Apple software, firmware and hardware components. Analyzing and exploiting vulnerabilities is also a key element of the role. This position requires someone with strong technical skills and a passion to secure systems by showing how they can be broken. If this is you, we'd love to hear from you.
Minimum Qualifications
Preferred Qualifications
Submit CV
Description
Safari, Mail or Messages. Evaluating the security of iOS and macOS kernels, boot ROMs, firmware and hardware are all included in the scope of the team. Working alongside a wide variety of teams and vendors, your influence will be felt throughout Apple's products such as the iPhone, iPad, Mac and Apple TV. As a member of the team, one of your main responsibilities will be to conduct vulnerability research on Apple software, firmware and hardware components. Analyzing and exploiting vulnerabilities is also a key element of the role. This position requires someone with strong technical skills and a passion to secure systems by showing how they can be broken. If this is you, we'd love to hear from you.
Minimum Qualifications
- Proven experience in vulnerability research and binary exploitation
- Significant understanding of common vulnerability classes and exploitation techniques
- Creative & effective problem-solving and analytical skills
- Ability to work independently and in a team environment
Preferred Qualifications
- Excellent knowledge of the security architecture of at least one complex operating system. Knowledge of macOS/iOS is nice-to-have, but not required.
- Experience with reverse-engineering tools (IDA Pro, Ghidra, etc.) and techniques Familiarity with tool development, using programming languages such as C, C++, Python, Swift, Objective-C
Submit CV
Report job