About the job
What You'll Do
Conduct in-depth security assessments of smart contracts, decentralized protocols, and blockchain ecosystems.
Evaluate protocol architectures to uncover potential vulnerabilities across DeFi mechanisms, tokenomics, governance structures, MEV strategies, bridges, and zero-knowledge systems.
Collaborate in a pod environment alongside experienced researchers within a focused team.
Deliver actionable insights with well-defined technical and business implications.
Replicate security exploits, develop proofs of concept, and occasionally offer code patches.
Contribute to the knowledge-sharing culture by authoring post-mortems, technical articles, and internal documentation.
Who You Are
Experienced: You possess a strong background in auditing complex smart contracts and are well-versed in Solidity, EVM behavior, and common vulnerability categories such as reentrancy, logic flaws, gas griefing, and access control. Familiarity with Move, ZK, Cairo, Rust, or low-level protocol implementations is a plus.
Curious and Tenacious: You dig deeper than surface-level issues, modeling systems comprehensively and challenging assumptions from fundamental principles.
Team-Oriented: You thrive when collaborating with fellow security researchers and protocol developers to deliver secure solutions.
Meticulous: You generate clear, concise, and thorough technical documentation. Your GitHub issues or findings are actionable and professionally presented.
Respected: You've made contributions to open-source projects, published security research, conducted audits, participated in CTFs, or established yourself in the bug bounty community.
Aligned with Decentralization: You appreciate open networks, cryptographic advancements, and the creation of resilient systems.
Preferred Qualifications
Thorough understanding of the Ethereum Virtual Machine (EVM) and Solidity programming.
Proven experience in auditing production-level smart contracts, whether independently or as part of a team.
Familiarity with cross-chain protocols, bridging systems, rollups, or zero-knowledge technologies.
History of identifying significant vulnerabilities in bug bounties, audits, or competitive events (e.g., Cantina, Paradigm CTF).
Acquainted with Ethereum security tools like Foundry, Echidna, Slither, etc.
Experience in drafting or scrutinizing technical specifications or protocol documentation.
