Cyber Vulnerability Researcher
        Duration:             
2-4 Months, > 4 Months        
        
            Internship Type:
Undergraduate, Pre-University        
    
Description
We use many different software and devices in our everyday lives. Unfortunately, many of these products may contain security vulnerabilities, which could be exploited to compromise a system or device. 
As a Cyber Vulnerability Researcher intern, you will:
- Conduct research into security vulnerabilities on systems and software.
 - Get an opportunity to understand how vulnerabilities manifest and how a malicious attacker can exploit them.
 - Look into various techniques to discover vulnerabilities, like reverse engineering, code auditing, black box testing, etc. 
 - Analyse the vulnerabilities and develop proof-of-concepts to demonstrate the security impact these vulnerabilities may have. 
 - Look into security mitigations and assess their effectiveness at mitigating these vulnerabilities.
 
Broad Deliverables
- Research into techniques and tools to discover vulnerabilities in systems and software.
 - Analyse security vulnerabilities and assess their impact.
 - Research into ways to mitigate these vulnerabilities.
 
Possible Projects*
- Windows systems
 - Network devices
 - Linux systems
 - Mobile devices
 - Cloud systems and services
 
Prerequisites/Skills Required
- Strong interest in Cybersecurity
 - Experienced in C/C++ programming and Python
 - Knowledge in assembly (e.g. x86, ARM), reverse engineering and software vulnerabilities (e.g. buffer overflows) is highly recommended.
 
 
Application
In your application, please submit the following documents in a single PDF file for 'Resume/CV':
1. Resume/CV
2. All Education Certificates to-date (from secondary to tertiary education)
- GCE 'O'/'N' Levels, NITEC
- Prelim/GCE 'A' Levels, IB/Diploma
- Latest university transcript from Year 1 (for current undergraduates)
3. Student Status Letter/Degree Audit (for current undergraduates)
*List is non-exhaustive as projects are subject to availability at point of application