- 
                
                
                scalable and efficient software and firmware analysis methodologies using tools like Frida or IDA Pro, enhanced with traffic monitoring techniques and Machine Learning to detect and analyze vulnerabilities 
- 
                
                
                analysis, modeling and applied ML experience is recommended, given the need to identify patterns in large-scale behavioral logs. Software reverse engineering (Frida, IDA Pro) experience is recommended 
Searches related to software verification
  Enter an email to receive alerts for software-verification positions