The Cybersecurity Engineer will specialize in reverse engineering web and mobile applications, circumventing advanced anti-bot defenses, and creating tailored tools to enable large-scale data collection. This role demands strong knowledge of network protocols, cryptographic analysis, and techniques for discreet system interaction in a continuously changing security environment.
Responsibilities
- Analyze web and mobile applications, including APK and IPA files, to expose hidden functionalities by disassembling and studying code structure, with emphasis on cryptographic protections.
- Assess and bypass modern security protocols such as TLS, HTTP/2, HTTP/3, WebSockets, DNS over HTTPS (DoH), and session controls to improve data access methods.
- Design and implement Python-based scripts and automation frameworks that adapt to security changes, including real-time modifications to TLS configurations and JavaScript execution.
- Develop and apply covert data collection strategies such as modifying browser behavior, evading headless browser detection, routing traffic through proxy networks, and mimicking human interaction patterns.
- Continuously evaluate, test, and refine tooling to maintain effectiveness against increasingly sophisticated defensive measures.
Requirements
- Strong enthusiasm for coding and reverse engineering, with a drive to explore system limitations while maintaining ethical integrity.
- Proficient in using reverse engineering tools such as IDA Pro, Ghidra, or custom solutions to analyze binary and web-based code.
- In-depth understanding of web and network technologies including TLS, HTTP/2, WebSockets, DNS over HTTPS (DoH), and related protocols.
- Advanced Python programming skills to build efficient, reliable solutions for complex technical challenges.
- Demonstrated ability to work independently on technical problems while also contributing effectively within a collaborative team setting.
Tech Stack
IDA Pro, Ghidra, Python, TLS, HTTP/2, HTTP/3, WebSockets, DoH, JavaScript, APK, IPA, headless browsers, proxy tunneling, browser patching
Benefits
- Flexible working environment
- Volunteer time off
- LinkedIn Learning
- Employee-Assistance-Program (EAP)
Work Arrangement
hybrid — Flexible working environment
- Driven by technological innovation and excellence in cybersecurity
- Values creative and precise solutions to practical challenges
- Committed to diversity, equity, and inclusion
- Encourages open communication and ongoing learning
- Supports employee well-being through EAP and professional development resources
Additional Information
- Artificial intelligence (AI) tools may be used during recruitment stages such as résumé screening, assessments, interview scheduling, job matching, communication, and administrative tasks.
- Use of AI follows principles of fairness, transparency, human oversight, and inclusion.
- Final hiring decisions are made solely by human reviewers.
- AI tools are regularly reviewed to reduce bias and ensure compliance with laws and regulations.
- Candidates may request human review of AI-assisted processes where permitted by law.
- Link to AI Safety Policies and Guiding Principles: https://www.nielseniq.com/global/en/ai-safety-policies
- Employment decisions are made without regard to race, color, religion, sex (including pregnancy, sexual orientation, or gender identity), national origin, age, disability, genetic information, marital status, veteran status, or any other protected characteristic under applicable laws.
