Demo

Security Researcher

Metalware
San Francisco, CA Full Time
POSTED ON 3/29/2025
AVAILABLE BEFORE 4/28/2025
Metalware is a startup dedicated to protecting cyber-physical systems in critical industries. We develop advanced firmware security solutions for industries where failure isn’t an option—ranging from aerospace/defense, automotive, and industrial controls to telecom and healthcare.

We are seeking a Security Researcher with deep embedded security expertise to challenge and secure firmware. In this role, you’ll deploy advanced reverse engineering, fuzzing, and offensive security, and penetration testing techniques to uncover vulnerabilities in complex firmware systems.

Who You Are

  • You possess extensive experience in analyzing and exploiting firmware, with a comprehensive understanding of low-level hardware/software interactions.
  • You are passionate about applying advanced techniques like symbolic execution, memory corruption analysis, and custom exploit development to real-world embedded challenges.
  • You enjoy engaging directly with cutting-edge customers—from drone and electric vehicle manufacturers to humanoid robot, nuclear reactor, and satellite companies—to understand their challenges and deliver rapid, effective solutions.
  • You’re comfortable gathering user feedback, understanding requirements, and quickly shipping code.
  • You want to work side-by-side with the founders to shape product direction and technical roadmap.
  • You’re passionate about developing high-quality embedded software and own every aspect of the development lifecycle—from design and coding to testing and ongoing support.

Responsibilities

  • Utilize tools like Ghidra, Binary Ninja, and IDA Pro to reverse engineer firmware binaries, dissecting their structure to reveal hidden vulnerabilities and exploitation vectors.
  • Design and execute targeted fuzzing campaigns, integrating dynamic analysis techniques to stress-test firmware under real-world conditions.
  • Engineer custom exploit chains to validate discovered vulnerabilities, leveraging techniques such as ROP chain crafting, heap spraying, and memory corruption exploitation.
  • Collaborate with our engineering and AI teams to translate technical findings into improved product interfaces, detailed vulnerability reports, and intuitive security dashboards that enable rapid remediation.
  • Stay ahead of emerging threats and attack methodologies by continuously researching cutting-edge techniques in binary analysis, symbolic execution, and adversarial testing, contributing to both internal R&D and external security communities.
  • Develop prototypes to validate design concepts, quantify technical constraints, and iterate on new ideas.
  • Gather and incorporate user feedback to continuously improve product features and performance.

Minimum Qualifications

  • Proficient in C, C , or Rust programming languages.
  • Demonstrated expertise in reverse engineering and penetration testing within embedded systems.
  • Hands-on experience with firmware analysis, including the use of tools like Ghidra, Binary Ninja, or IDA Pro.
  • Bachelor’s degree in Computer Science, Engineering, Mathematics, or a related STEM discipline with 3 years of professional software engineering experience; OR 5 years of professional software engineering experience in lieu of a degree.

Ideal Qualifications

  • Active participation in CTF competitions or similar high-caliber security challenges.
  • In-depth knowledge of exploit development techniques, including ROP, heap exploitation, and memory corruption attacks.
  • Experience integrating security findings into product development, with a keen eye for refining UI and report outputs for clarity and actionability.
  • A robust understanding of cybersecurity best practices, vulnerability management, and embedded system architectures.

Additional Requirements

  • Must be willing to work extended hours and weekends as needed to meet project deadlines and deliverables.

Benefits

  • Competitive salary and equity package.
  • Full health, vision, and dental benefits.
  • Opportunities for continuous professional development, including training and conference participation.

Salary : $120,000 - $200,000

If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution. Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right. Surveys & Data Sets

What is the career path for a Security Researcher?

Sign up to receive alerts about other jobs on the Security Researcher career path by checking the boxes next to the positions that interest you.
Income Estimation: 
$59,793 - $89,166
Income Estimation: 
$73,266 - $131,599
Income Estimation: 
$83,579 - $128,541
Income Estimation: 
$80,479 - $90,779
Income Estimation: 
$90,609 - $105,383
Income Estimation: 
$90,609 - $105,383
Income Estimation: 
$117,524 - $131,245
Income Estimation: 
$117,524 - $131,245
Income Estimation: 
$145,630 - $167,634
Income Estimation: 
$145,630 - $167,634
Income Estimation: 
$162,729 - $194,659
View Core, Job Family, and Industry Job Skills and Competency Data for more than 15,000 Job Titles Skills Library

Job openings at Metalware

Metalware
Hired Organization Address San Francisco, CA Full Time
Metalware is a startup dedicated to protecting cyber-physical systems in critical industries. We develop advanced firmwa...

Not the job you're looking for? Here are some other Security Researcher jobs in the San Francisco, CA area that may be a better fit.

Staff Security Researcher/Engineer

Intuit, San Francisco, CA

SECURITY RESEARCHER / VULNERABILITY SPECIALIST

Target Labs, Inc, San Francisco, CA

AI Assistant is available now!

Feel free to start your new journey!