We are looking for a highly skilled Reverse Engineer to analyze and understand complex, closed-source distributed system binaries. You will work closely with a security research team to uncover internal logic, execution flows, and potential vulnerabilities in high-performance networked systems.
This role is hands-on, low-level, and requires deep curiosity and persistence.
What You’ll Do
-
Reverse engineer compiled native binaries (primarily Rust/C/C++)
-
Reconstruct program logic, state machines, and networking behavior
-
Trace execution paths to identify crash conditions, edge cases, and vulnerabilities
-
Analyze custom protocols (P2P, RPC, binary formats)
-
Work with debuggers to reproduce and validate findings in controlled environments
-
Collaborate with security researchers to turn insights into exploitable or provable issues
-
Document findings clearly (control flow, key functions, invariants, failure points)
Requirements
-
Strong experience in reverse engineering native binaries
-
Proficiency with tools such as:
-
Ghidra
-
IDA Pro
-
GDB
Solid understanding of:
-
Low-level systems (memory, threading, async execution)
-
Assembly (x86_64 required; ARM is a plus)
-
Networking fundamentals (P2P systems preferred)
-
Ability to read or infer logic from Rust, Go, or C/C++ binaries
-
Experience debugging crashes, panics, or undefined behavior
Nice to Have
-
Background in blockchain systems or distributed consensus
-
Experience reversing network protocols or custom serialization formats
-
Familiarity with fuzzing, symbolic execution, or dynamic tracing
-
Prior work in security research, exploit development, or bug bounties
What We Care About
-
Ability to figure things out without documentation
-
Strong debugging intuition (why did this crash? what assumptions broke?)
-
Clear thinking under ambiguity
-
Speed + depth (not just surface-level reversing)