Security Research Expert - Remote Position
About the Role
We're hiring a Security Research Expert to join our dynamic team remotely. As a Security Research Expert, you will play a crucial role in identifying and mitigating vulnerabilities in open-source software. This position offers the flexibility to work from anywhere, making it an ideal opportunity for those seeking a remote role in cybersecurity.
What You'll Do
- Triage and validate the security relevance of crash reports.
- Perform in-depth root cause analysis of memory corruption bugs, such as buffer overflows and use-after-free vulnerabilities.
- Assess exploitability and determine the real-world impact of identified vulnerabilities.
- Develop reliable Proof-of-Concept (PoC) exploits for confirmed flaws.
- Document findings, reproduction steps, and security impact clearly and comprehensively.
Requirements
- Proven experience in vulnerability research, reverse engineering, and exploit development.
- Deep understanding of memory corruption bugs and modern security mitigations (ASLR, DEP/NX, Stack Canaries, CFI).
- Proficiency with analysis tools such as GDB, WinDbg, IDA Pro, Ghidra, ASan, UBSan, or Valgrind.
- Solid understanding of OS internals, memory management, and computer architecture.
- Exceptional communication skills for documenting complex technical findings.
What We Offer
- Competitive pay ranging from $55 – $75/hr, depending on experience.
- Flexible weekly hours, from 10 – 40 hours, to suit your schedule.
- Fully remote work environment, offering global flexibility (U.S. preferred).
- Opportunity to work on cutting-edge security research projects with significant impact.
This Security Research Expert role offers an exciting opportunity to work remotely with competitive pay and flexibility. Join a team focused on impactful cybersecurity projects.
About Haystack
Explore exciting career opportunities at Haystack in 2026. Browse a wide range of remote, hybrid, and office positions tailored to your skills. Utilize our advanced filters, track your applications, and gain valuable insights into our company culture. Whether you’re seeking your next challenge or a fresh start, find the perfect Haystack role that matches your career aspirations today.
Who Will Succeed Here
Proficient in reverse engineering techniques using tools like IDA Pro and Ghidra, with a hands-on ability to dissect complex binaries and identify vulnerabilities.
Self-motivated and disciplined to work independently in a remote environment, with strong time management skills to prioritize tasks and meet deadlines effectively.
Experience in exploit development, particularly in crafting proof-of-concept exploits for identified vulnerabilities, demonstrating a proactive approach to security research.
Learning Resources
Career Path
Market Overview
Skills & Requirements
Domain Trends
Industry News
Loading latest industry news...
Finding relevant articles from the last 6 months