- 
                
                
                
scalable and efficient software and firmware analysis methodologies using tools like Frida or IDA Pro, enhanced with traffic monitoring techniques and Machine Learning to detect and analyze vulnerabilities
 - 
                
                
                
analysis, modeling and applied ML experience is recommended, given the need to identify patterns in large-scale behavioral logs. Software reverse engineering (Frida, IDA Pro) experience is recommended
 
Searches related to software verification
  Enter an email to receive alerts for software-verification positions