We conduct in-depth exploration and research into the latest technologies such as Generative AI, IoT, Metaverse, etc, to understand their technical limitations and security implications. We perform in-depth security assessment of these new technologies through activities such as vulnerability resear
We are looking for individuals that are passionate about cyber research and enjoy experimenting with disruptive, revolutionary ways of doing things. Thinking out of the box and having the perseverance to work through new ideas is key. This team conducts research on advanced actors and their techniqu
1. We are looking for individuals that are passionate about cyber research and enjoy experimenting with disruptive, revolutionary ways of doing things. Thinking out of the box and having the perseverance to work through new ideas is key. 2. This team conducts research on advanced actors and their te
Conduct research to gain in-depth understanding of the security products and technologies, such as EDR solutions, AI security technologies, Zero Trust applications, etc Perform in-depth assessment on the efficacy of security products and validate their effectiveness for protecting various systems in
Conduct research to gain in-depth understanding into emerging security threats in embedded systems and devices Design, develop and implement innovative security solutions running on embedded devices (including device firmware and application software) to mitigate threats Background in Infocomm Secur
Conduct Malware Analysis and Threat hunting on malwares for Cyber Defensive Conduct research on latest malware techniques that could be used by threat actors so to provide early defense and warning Background in Computer Science, Computer/Electrical Engineering, Infocomm Security, Computer Security,
Investigate threats and assess the impact on systems and software Conduct research to gain in-depth understanding of the operating system architecture (kernel and subsystems) and how these subsystems could be exploited by malware Perform information security assessments through vulnerability researc
Conduct R&D on state-of-the-art telecommunications, mobile technologies and enterprise Unix-based systems to conceptualize, design and develop advanced solutions and capabilities Perform threats and impact assessments through vulnerability research, code audit, black box testing and reverse engineer
Get weekly curated job picks, salary trends, and career insights delivered to your inbox.