Bachelor's degree in Engineering, Information Systems, Computer Science, or related field and 2+ years of Software Engineering or related work experience. OR Master's degree in Engineering, Information Systems, Computer Science, or related field and 1+ year of Software Engineering or related work experience. OR PhD in Engineering, Information Systems, Computer Science, or related field. 2+ years of academic or work experience with Programming Language such as C, C++, Java, Python, etc. Strong proficiency in C and C++, with deep understanding of memory management and low-level programming. Proficiency with static analysis tools (e.g., CodeQL, Klocwork, Coverity, Helix QAC, Parasoft, Clang Static Analyzer). Strong understanding of common vulnerability classes (e.g., buffer overflows, UAF, race conditions). Hands-on experience with fuzzing frameworks (e.g., AFL++, libFuzzer, Honggfuzz). DevOps experience, and interest in engaging in DevOps activities, in the area of automated vulnerability detection. Excellent written communication skills. Experience with ARM architecture, including reverse engineering and binary analysis. Familiarity with exploit mitigation techniques and their implementation in modern toolchains and operating systems. Familiarity with AI advances in this area.