hero

Work with the most ambitious teams.

Your
single
hub
to
explore
opportunities
at
the
best
technology
companies,
backed
by
Blackbird.

Vulnerability Researcher / Developer

Cyble

Cyble

Software Engineering
Bengaluru, Karnataka, India
Posted on Mar 28, 2025

About Cyble:

Cyble is revolutionizing the landscape of cybersecurity intelligence. Founded in 2019, Cyble began as a visionary college project and has quickly transformed into a leading force in proactive cyber threat detection and mitigation, that is now globally significant, with people in 20 countries - Headquartered in Alpharetta, Georgia, and with offices in Australia, Malaysia, Singapore, Dubai, Saudi Arabia and India

Our mission is clear: to provide visibility, intelligence and cybersecurity protection using cutting-edge advanced technology, giving enterprises a powerful advantage. We democratize real-time intelligence about cyber threats and vulnerabilities, enabling organizations to take proactive measures and maintain robust cybersecurity. We strive to make the digital world a safer place for everyone.

At Cyble, artificial intelligence (AI) and innovation are central to all operations, with a commitment to continuous improvement and excellence in both products and business practices. Cyble values inclusivity, offering team members autonomy and flexibility to balance their professional and personal lives. Cyble fosters a culture where employees voices are heard, contributions are recognized, and everyone is encouraged to be part of something extraordinary.

About the Role:

We are seeking a Vulnerability Researcher / Developer to help design and develop a highly scalable internet-wide scanning and data leak detection systems.

This role involves vulnerability research, internet scanning, data indexing, and automation to discover exposed assets, misconfigurations, and leaked sensitive data in real time. The ideal candidate has a strong background in network security, web security, and large-scale distributed systems.

What You’ll Do At Cyble:

Vulnerability Research & Detection

  • Research and identify common misconfigurations and exposed assets across cloud, network, and web environments.
  • Develop automated fingerprinting techniques to classify exposed services, databases, and sensitive information leaks.
  • Stay updated on zero-day vulnerabilities and create PoC (proof of concept) scanners to identify real-world exposures.

Internet-Wide Scanning & Data Collection

  • Build and maintain an internet-wide scanning system to detect open ports, exposed databases, and misconfigured services.
  • Leverage ZMap, Masscan, Shodan-like techniques, or custom-built scanners for large-scale reconnaissance.
  • Implement efficient banner-grabbing and metadata extraction for detected services.

Data Processing & Indexing

  • Develop a scalable data ingestion pipeline to store and process massive amounts of scan results and leaked data.
  • Use Elasticsearch, PostgreSQL, or similar to index and query discovered vulnerabilities efficiently.
  • Implement data enrichment techniques to correlate findings with CVEs, threat intelligence feeds, and known vulnerabilities.

Automation & Security Tool Development

  • Write and maintain Python, Go, or Rust-based scripts for vulnerability scanning and detection.
  • Develop custom reconnaissance tools and API integrations to enrich security research.
  • Automate reporting, alerting, and notifications for leaked credentials, misconfigured cloud assets, and exposed systems.

Collaboration & Compliance

  • Work with ethical hacking, penetration testing, and security operations teams to refine scanning methodologies.
  • Ensure compliance with responsible disclosure policies and legal requirements for scanning public infrastructure.
  • Collaborate with DevOps and cloud teams to develop security best practices for exposure prevention.

What You’ll Need:

Technical Skills:

  • Strong experience in network security, vulnerability research, and internet-wide scanning.
  • Proficiency in Python, Go, or Rust for developing custom scanners and automation tools.
  • Experience with ZMap, Masscan, Nmap, Shodan API, Censys, or similar internet scanning tools.
  • Knowledge of Elasticsearch, PostgreSQL, Redis, or similar databases for large-scale data storage and indexing.
  • Familiarity with cloud security (AWS, Azure, GCP) and detecting exposed cloud services.
  • Experience with regular expressions, parsing, and fingerprinting technologies for classifying leaked data.

Security & Research Skills:

  • Strong understanding of TCP/IP, web protocols (HTTP, DNS, FTP, SMB, etc.), and common attack vectors.
  • Experience with passive and active reconnaissance techniques.
  • Knowledge of exposed database risks (MongoDB, Elasticsearch, Redis, PostgreSQL, etc.).
  • Familiarity with Common Vulnerabilities and Exposures (CVE) databases and security frameworks.

Soft Skills:

  • Ability to work independently and research emerging vulnerabilities.
  • Strong problem-solving and analytical skills.
  • Excellent communication skills to document findings and collaborate with teams.

Preferred Qualifications:

  • Experience in ethical hacking, penetration testing, or bug bounty programs.
  • Contributions to open-source security tools or projects

If you like working in an inclusive environment, you want to advance your career quickly, and your opinion is valued, look no further than Cyble, Inc. We are young, hungry, and ready to impact the cyber security landscape!

Cyble, Inc. takes into consideration an individual’s skillset, experience and location in making final salary determination. For further details, please discuss with the recruiter.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, protected Veteran status age, or genetics, or any other characteristic protected by law.