Vulnerability Researcher Manufacturing - Cupertino, CA at Geebo

Vulnerability Researcher

SummaryPosted:
Weekly Hours:
40 Role Number:
200537641Home Office:
YesApple's Security Engineering & Architecture organization is responsible for the security of all Apple products. Passionate about safeguarding our users, we believe that the best defense requires a great offense. When it comes to securing more than a billion devices running the world's most sophisticated operating systems, that means finding vulnerabilities first.
Can you make a difference on this scale? Join our extraordinary team of security researchers and help protect all Apple users.Key QualificationsProven experience in vulnerability research and binary exploitationSignificant understanding of common vulnerability classes and exploitation techniquesCreative & effective problem-solving and analytical skillsExperience with reverse-engineering tools (IDA Pro, Ghidra, etc.) and techniquesExcellent knowledge of the security architecture of at least one complex operating system. Knowledge of macOS/iOS is nice-to-have, but not required.Familiarity with tool development, using programming languages such as C, C++, Python, Swift, Objective-CAbility to work independently and in a team environmentStrong written and verbal communication skillsDescriptionOur team focuses on securing Apple products, from microarchitecture to applications such as Safari, Mail or Messages. Evaluating the security of iOS and macOS kernels, boot ROMs, firmware and hardware are all included in the scope of the team. Working alongside a wide variety of teams and vendors, your influence will be felt throughout Apple's products such as the iPhone, iPad, Mac and Apple TV.
As a member of the team, one of your main responsibilities will be to conduct vulnerability research on Apple software, firmware and hardware components. Analyzing and exploiting vulnerabilities is also a key element of the role. This position requires someone with strong technical skills and a passion to secure systems by showing how they can be broken.
If this is you, we'd love to hear from you.Education & ExperienceDegree in Computer Science / Computer Electronics (or equivalent experience)Pay & BenefitsAt Apple, base pay is one part of our total compensation package and is determined within a range. This provides the opportunity to progress as you grow and develop within a role. The base pay range for this role is between $170,700.00 and $300,200.00, and your base pay will depend on your skills, qualifications, experience, and location.Apple employees also have the opportunity to become an Apple shareholder through participation in Apple's discretionary employee stock programs. Apple employees are eligible for discretionary restricted stock unit awards, and can purchase Apple stock at a discount if voluntarily participating in Apple's Employee Stock Purchase Plan. You'll also receive benefits including:
Comprehensive medical and dental coverage, retirement benefits, a range of discounted products and free services, and for formal education related to advancing your career at Apple, reimbursement for certain educational expenses including tuition. Additionally, this role might be eligible for discretionary bonuses or commission payments as well as relocation. Learn more about Apple Benefits.Note:
Apple benefit, compensation and employee stock programs are subject to eligibility requirements and other terms of the applicable plan or program.Apple is an equal opportunity employer that is committed to inclusion and diversity. We take affirmative action to ensure equal opportunity for all applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, Veteran status, or other legally protected characteristics.Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.