Preferred qualifications:
- Master's degree or PhD in Computer Science.
- Experience identifying vulnerabilities in wireless protocols or implementations.
- Experience writing exploits for wireless communication vulnerabilities on secured devices (e.g., Android, iOS, Linux based platforms).
- Experience presenting security research at conferences or workshops, and participating in Capture the Flag (CTF) events and Vulnerability Rewards Programs (VRP).
- Knowledge of applied cryptography.