iOS Vulnerability Researcher
AustraliaJob Description
Key Skills Required
Master these to land this role
Want to know if you're a match for this job?
About Interrupt Labs: Interrupt Labs is a world-class, industry-leading boutique cybersecurity research enterprise specializing in advanced vulnerability research, offensive security modeling, and deep reverse engineering across Apple ecosystems. Operating as an inclusive, collaborative, and remote-first framework, we ditch legacy corporate rigidity in favor of an environment where deep experimentation thrives, data visibility is premium, and elite security engineers are empowered to break apart complex architectures to secure global digital privacy barriers.
Position Overview
We are seeking an experienced, deeply passionate iOS Vulnerability Researcher to join our elite mobile security engineering vertical. In this execution-driven track, you will not be writing standard consumer web endpoints—you will operate at the absolute cutting edge of system internals, utilizing static and dynamic analysis techniques to discover complex zero-day vulnerabilities inside Apple operating systems. You will design functional Proof-of-Concepts (PoCs) for discovered memory corruption issues, build custom low-level fuzzing tooling loops, and interface with deep kernel code bases to isolate security vulnerabilities globally.
Key Responsibilities
- Advanced Platform Bug Hunting: Identify, isolate, and document high-severity security vulnerabilities across Apple userland components, private frameworks, and low-level system daemons using advanced reverse engineering methods.
- Proof-of-Concept Engineering: Write, scale, and validate functional exploit Proof-of-Concepts (PoCs) utilizing modern, secure programming structures to map structural vulnerability impacts.
- Reverse Engineering & Disassembly: Analyze, reverse engineer, and audit complex closed-source ARM64 binaries leveraging industry-standard diagnostic tools including IDA Pro, Binary Ninja, and Frida hooks.
- XNU Kernel & Architecture Audit: Review low-level platform internals, covering operating system layers like XNU kernel code bases, IOKit architectures, and advanced secure enclave runtime mitigations.
- Custom Security Tooling Synthesis: Develop proprietary automation tools, custom fuzzers, and specialized script wrappers using rapid prototyping environments to accelerate binary evaluation loops.
- Technical Documentation & Presentation: Distill convoluted low-level runtime errors and logic vulnerabilities into accessible, high-signal analytical summaries for internal engineering review.
Required Skills & Qualifications
- Demonstrated technical tracking background executing full-cycle vulnerability research, offensive threat mapping, or deep reverse engineering inside embedded software systems.
- Advanced software script scripting proficiency developing tools or code wrappers in modern system programming languages like Python or Rust.
- Strong, production-grade comfort reading, writing, and debugging low-level compiled environments including C, C++, Swift, Objective-C, and raw assembly lines.
- Proven capacity to independently deconstruct closed application frameworks, investigate memory corruption issues, and bypass structural exploit mitigations.
- Outstanding problem-solving mechanics with a deep-seated curiosity to analyze abstract system designs under minimal supervision.
- Location Context: 100% remote working infrastructure and location-agnostic tracking supported open to qualified cybersecurity engineers based anywhere within Australia, or globally (International Remote allowance available).
Preferred Strategic Indicators (Nice to Have)
- Direct previous background mapping security design vulnerabilities explicitly inside Apple XPC protocols or userland system daemons.
- Familiarity leveraging Large Language Models (LLMs) and custom automated context engineering to accelerate secure assembly code evaluation streams.
What We Offer
- The unmatched runway to run deep-tech security exploration inside one of the industry’s most celebrated mobile research syndicates.
- Highly competitive global compensation package calibrated accurately based on verified reverse-engineering tool experience depth.
- 25 days of accrued annual paid holiday allocation plus standard localized public holidays.
- Lucrative corporate annual bonus packaging tied cleanly to overall company performance targets.
- Minimum of 12% guaranteed Superannuation fund contributions for Australia-based crew members.
- Generous dedicated annual budget allotments for global technology conference admissions, training platforms, and research materials.
- Comprehensive Employee Assistance Programs (EAP) alongside vibrant company socials throughout the calendar year.
How would you rate this job post?
See what other professionals think about this role.
Is this company safe?
Ask Hyrizon AI to scan this company for potential red flags before you apply.
Safety First
- Never pay for a job application.
- Do not share sensitive bank info.
- Verify the client before starting work.