Are you passionate about breaking software? Are you someone who eats, drinks, breathes and dreams security? If yes, then Payatu is the place for you. We are always in search of passionate people to expand our renowned Bandit family at Payatu. In the quest for Bandits. We looking for individuals passionate about vulnerability discovery, reverse engineering, and exploit development to join our esteemed team. Here is an excellent opportunity we would like to share with you.
Who we are?
We are a bunch of young and passionate folks who are driven by the power of the latest and innovative technologies. We are on the mission of making the Cyberworld safe for every organization, product, and individual.
What we look for outside work parameters?
-Your expertise is your primary qualification, not your degree or certification.
–Your publicly known contributions are your credentials.
–Papers you have written, tools you have developed are your references.
–Your write-up reflects your interests and ethics.
–Your published exploits, your CTF scores and hall of fame listings are the testimonies of your work.
–Your research paper published and presented at conferences.
–You are learning from the community and enthusiastically contributing back.
You are a perfect technical fit if:
-Strong fundamental of Operating System Concept i.e. Process Management, Memory Management, File system management etc.
–You have a thorough understanding of a wide range of vulnerability classes.
–The ability to read and understand x86/x64 assembly code.
–Demonstrated ability to discover zero-day vulnerabilities in modern software.
–Demonstrated ability to exploit modern software.
–Knowledge in exploitation technology, such as Shellcode, Heap Spray, ROP etc.
–Proficiency with reverse engineering tools like debuggers, IDA Pro.
–Solid programming skills with languages such as C, C++, Python or Ruby is required.
You Have All Our Desired Qualities, if:
–You have a history of publishing or presenting good research.
–You have the knack of finding security bugs in everything you touch.
–You like automating stuff.
–You like writing tools.
–You have excellent written and verbal communication skills and ability to express your thoughts clearly.
–You have the ability to work independently as well as within a team and meet project schedule and deadlines.
–You have Strong problem solving, troubleshooting and analysis skills.
–You are passionate about your area of expertise and self-driven.
–You are comfortable working in a dynamic and fast-paced work environment.
–You are Self-driven, proactive, hardworking, team-player.
–You are working on something on your own in your field apart from official work.
Your everyday work will look like:
–Discover and exploit vulnerabilities affecting high profile commercial and consumer software.
–Attack vector enumeration of the target application.
–Static or dynamic analysis of the target application.
–Reverse engineer, debug and identify of vulnerabilities.
–Writing exploitation code and technical documentation.