iOS Vulnerability Researcher

Interrupt Labs
Hybrid

About The Position

We are looking for experienced and passionate people who have a background in vulnerability research, offensive security and reverse engineering on Apple platforms. You'll join our team looking to identify vulnerabilities in Apple platforms using both static and dynamic analysis techniques. You'll develop Proof-of-Concepts for vulnerabilities identified. You'll use common VR toolsets such as fuzzers, LLMs and reverse engineering tools; as well as have access to custom tooling built in-house (along with developing your own!). You'll need to present your findings in a useful and accessible way to others. You'll have access to internal and external training and conferences to refine and hone your skillsets.

Requirements

  • Background in vulnerability research, offensive security and reverse engineering on Apple platforms.
  • Developed tools and proof of concepts in a modern programming language such as Python and Rust.
  • Skills in debugging and hacking around with low level or other relevant languages such as C, Swift, C++, Objective C, etc.
  • Ability to reverse engineer ARM64 binaries using common toolsets such as IDA, Binary Ninja and Frida.
  • Interest and a passion in learning new things, taking them apart, and getting stuck into new problems and challenges.

Nice To Haves

  • Research on the low-level internals of Apple platforms, including topics such as runtime internals, platform security features and exploit mitigations.
  • Reverse engineering and vulnerability research on userland components on Apple platforms including XPC protocols, private frameworks and userland system daemons.
  • iOS application reverse engineering and bug hunting, looking for weaknesses, logic bugs and memory corruption issues.
  • Kernel or system level software internals and vulnerability research, for example XNU code review or IOKit reverse engineering and exploitation.

Responsibilities

  • Identify vulnerabilities in Apple platforms using both static and dynamic analysis techniques.
  • Develop Proof-of-Concepts for vulnerabilities identified.
  • Use common VR toolsets such as fuzzers, LLMs and reverse engineering tools.
  • Utilize custom tooling built in-house and develop your own tooling.
  • Present findings in a useful and accessible way to others.
  • Refine and hone skillsets through internal and external training and conferences.

Benefits

  • 25 days annual leave, rising by 1 day per year up to 28 days + bank holidays
  • Annual bonus based on company targets
  • 6% matched pension
  • Training and conference budgets
  • Private medical insurance
  • Employee assistance program
  • 4x death in service
  • Cycle to work scheme
  • Company socials throughout the year
  • Free soft drinks, hot drinks, beer and snacks in office
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service