To apply for this job please visit boards.greenhouse.io.
Duration: 2+ months
In our C++ teams in Leuven (BE) and Munich (DE) we work on our LLVM-based solution, iXGuard. By applying code transformations, code injection, binary instrumentation, code analysis, and more, this product focuses on hardening iOS applications against reverse engineering, both static analysis and dynamic tampering.
Using LLVM’s disassembler and its MC layer, define a basic API to modify any instruction found in a binary. Additionally develop a mechanism, similar to objcopy, to be able to add code and data to pre-existing, already linked Mach-O’s and ELF’s.
- Assembly experience
- C++ experience
- Some knowledge about binary file formats
Guardsquare offers the most complete approach to mobile application security on the market. Built on the open source ProGuard technology, Guardsquare’s software integrates seamlessly across the development cycle. From app security testing to code hardening to real-time visibility into the threat landscape, Guardsquare solutions provide enhanced mobile application security from early in the development process through publication.
More than 900 customers worldwide across all major industries rely on Guardsquare to help them identify security risks and protect their mobile applications against reverse engineering and tampering.
Guardsquare is based in Leuven (Belgium) with offices in Boston (USA) and Munich (Germany).
At Guardsquare, we take pride in being a diverse and multicultural company with team members representing numerous nationalities. We value different perspectives and opinions throughout the business which has contributed to our being the market leader in mobile application security.
You will be part of a dynamic team that strives for excellence and focuses on continuous education and enhancement in skills. We encourage & empower our trusted colleagues to share their opinions, actively collaborate, and continue to learn and grow.