Loading...
All positions
[ Surfaces ] Position

Embedded ExploitationEngineer

Zealot is deploying AI systems at the center of western cyber operations, backed by tier-1 US VCs and industry leaders. Our team includes alumni of Anthropic, xAI, NSA, USCYBERCOM, Anduril, 8200, and the Mossad. Soon live with the U.S. Department of War and close U.S. allies abroad.

APPLIED AIREVRBARE METAL
Doc // ZL.SUR.EMBE
Rev // 2026.04
Classification // OPEN

§What You'll Do

  • Identify and exploit vulnerabilities in embedded systems, IoT devices, and real-time operating systems.
  • Reverse engineer firmware to map attack surfaces, discover bugs, and develop reliable exploits.
  • Build scalable tooling for automated vulnerability discovery across diverse embedded platforms.
  • Research novel attack techniques against constrained environments and proprietary protocols.

§Requirements

  • Strong reverse engineering experience with embedded firmware and bare-metal systems.
  • Proven vulnerability research experience: CVEs, advisories, or offensive work on embedded targets.
  • Deep understanding of ARM, MIPS, or other embedded architectures.
  • Proficiency with hardware debugging (JTAG, UART, SPI/I2C) and firmware extraction.
  • Strong C/C++ skills for low-level exploit development.

§Nice to Have

  • Experience with RTOS platforms: VxWorks, FreeRTOS, ThreadX, QNX.
  • Proficiency with Ghidra, IDA, Binwalk, and custom analysis frameworks.
  • Experience with protocol reverse engineering (Zigbee, BLE, proprietary RF).
  • Familiarity with supply chain security and hardware implant research.
  • Experience building with LLMs and AI agents.
  • Published research or conference presentations on embedded security.

§You Are

  • Clearly interested in stepping away from purely manual research and moving toward the development of AI systems.
  • Building something massive matters more to you than comfort, titles, or predictability.
  • You want to be early at a company that will change an industry, and you're ready to do what that actually takes.
For Recruiters

Note to recruiting firms: Embedded vulnerability research and exploit development are the core requirements. Hardware hacking and RTOS experience are strong pluses.

Ready?

Apply for Embedded Exploitation Engineer

Email team@zealotlabs.com with a resume and a paragraph on what you want to build with us.

Apply now