Conduct comprehensive vulnerability research across diverse domains, including operating systems, web browsers, hypervisors, and cloud environments. Develop PoC exploits and mitigation strategies for discovered vulnerabilities. ยท Author and publish research...
Perform digital forensics analysis on various types of evidence, such as disk, memory, network, and cloud artifacts (AWS โ advantage). Support incident response efforts by providing technical expertise, containment, eradication,...
Conduct comprehensive vulnerability research across diverse domains, including operating systems, web browsers, hypervisors, and cloud environments. Develop PoC exploits and mitigation strategies for discovered vulnerabilities. ยท Author and publish research...