Cutshort logo
Reverse engineering jobs

4+ Reverse engineering Jobs in India

Apply to 4+ Reverse engineering Jobs on CutShort.io. Find your next job, effortlessly. Browse Reverse engineering Jobs and apply today!

icon
Remote only
0 - 10 yrs
₹5L - ₹10L / yr
Artificial Intelligence (AI)
Cyber Security
socio-technical probing
Penetration testing
exploit development
+1 more

Location: Remote; Geography restricted to India

Type: Full-time or Part-time Contract Work

Fluent Language Skills Required: English & Hindi. Native-level fluency in English and Hindi is required for this position.

Why This Role Exists

At Mercor, we believe the safest AI is the one that’s already been attacked — by us. We are assembling a red team for this project - human data experts who probe AI models with adversarial inputs, surface vulnerabilities, and generate the red team data that makes AI safer for our customers.

This project involves reviewing AI outputs that touch on sensitive topics such as bias, misinformation, or harmful behaviors. All work is text-based, and participation in higher-sensitivity projects is optional and supported by clear guidelines and wellness resources. Before being exposed to any content, the topics will be clearly communicated.

What You’ll Do

  • Red team conversational AI models and agents: jailbreaks, prompt injections, misuse cases, bias exploitation, multi-turn manipulation
  • Generate high-quality human data: annotate failures, classify vulnerabilities, and flag systemic risks
  • Apply structure: follow taxonomies, benchmarks, and playbooks to keep testing consistent
  • Document reproducibly: produce reports, datasets, and attack cases customers can act on

Who You Are

  • You bring prior red teaming experience (AI adversarial work, cybersecurity, socio-technical probing)
  • You’re curious and adversarial: you instinctively push systems to breaking points
  • You’re structured: you use frameworks or benchmarks, not just random hacks
  • You’re communicative: you explain risks clearly to technical and non-technical stakeholders
  • You’re adaptable: thrive on moving across projects and customers

Nice-to-Have Specialties

  • Adversarial ML: jailbreak datasets, prompt injection, RLHF/DPO attacks, model extraction
  • Cybersecurity: penetration testing, exploit development, reverse engineering
  • Socio-technical risk: harassment/disinfo probing, abuse analysis, conversational AI testing
  • Creative probing: psychology, acting, writing for unconventional adversarial thinking

What Success Looks Like

  • You uncover vulnerabilities automated tests miss
  • You deliver reproducible artifacts that strengthen customer AI systems
  • Evaluation coverage expands: more scenarios tested, fewer surprises in production
  • Mercor customers trust the safety of their AI because you’ve already probed it like an adversary

Why Join Mercor

  • Build experience in human data-driven AI red teaming at the frontier of safety
  • Play a direct role in making AI systems more robust, safe, and trustworthy

The contract rate for this project will be aligned with the level of expertise required, the sensitivity of the material, and the scope of work. Competitive rates commensurate with experience.

Read more
Kmatiin

at Kmatiin

1 recruiter
Adi m
Posted by Adi m
Bengaluru (Bangalore)
5 - 6 yrs
₹10L - ₹15L / yr
skill iconVue.js
skill iconAngularJS (1.x)
skill iconAngular (2+)
skill iconReact.js
skill iconJavascript
+20 more

Relevant experience on using tools like JSP, Servlet for web applications

· MVC frame works - Struts or Spring

· Web services- SOAP and REST WebLogic, Hibernate

· Middleware technologies MQ OSB.

· Web/App Servers: Tomcat or WebLogic or JBoss

· Experience using Angular, Micro Services using Spring, jersey, Swagger

· Good knowledge of Backend and Front-end technologies

· Good knowledge of Core Java, J2EE, Ajax, Spring, Java Script, jQuery, HTML

· Good knowledge of any RDBMS database like SQL Server, Oracle, MySQL & Cluster set-up, performance benchmarking, client-side API evaluation, knowledge of various deployment strategies

· Strong knowledge with Core JAVA concepts – Exception handling, Multi-threading, Collection, String, OOPS etc…

· Advanced understanding of Windows and Linux based operating systems

· Mainly 3-4 months hands on with reverse engineering and old legacy solutions to new modern applications

· Working knowledge using REST, HTTP, TCP, SCTP protocols

· Hands-on with JAVA frameworks such as – Thread Pool Executor, Object Pooling, Logging (Log4j preferred), XML/JSON handling

Education Criteria:

· Preferred BE degree in CS, E&C, E&E

· Proficient being a J2EE Developer (courses or project done) and data analytics skills

· Flexible to work on any projects assigned

 

Note: Terms & Conditions

· This opportunity will be work from office

· Reporting location - Bangalore office, Vijayanagar

Read more
Kmatiin

at Kmatiin

1 recruiter
Shruthi malagi
Posted by Shruthi malagi
Bengaluru (Bangalore)
5 - 10 yrs
₹10L - ₹15L / yr
skill iconJava
J2EE
skill iconSpring Boot
Hibernate (Java)
JSP
+3 more

What we need from you

  • You will bring very strong consulting skills, are customer focused and know how to navigate through tough project situations
  • You are highly motivated, creative in your approach to technical problems and love all things about Data!
  • You spend a significant amount of time to keep your technical skills updated and are constantly looking for the next big data challenge
  • You will be a key contributor to our growth and our customer’s success
  • You will bring both broad and deep knowledge in Efficient Java (JSP, Servlet) Developer and going forward build the ability to architect a solution by mapping a customer business challenges
  • You are resourceful and confident under pressure
  • Willingness to travel as needed to customer sites

 

Competencies:

  • Relevant experience on using tools like JSP, Servlet for web applications
  • MVC frame works - Struts or Spring
  • Web services- SOAP and REST WebLogic, Hibernate
  • Middleware technologies MQ OSB.
  • Web/App Servers: Tomcat or WebLogic or JBoss
  • Experience using Angular, Micro Services using Spring, jersey, Swagger
  • Good knowledge of Backend and Front-end technologies
  • Good knowledge of Core Java, J2EE, Ajax, Spring, Java Script, jQuery, HTML
  • Good knowledge of any RDBMS database like SQL Server, Oracle, MySQL & Cluster set-up, performance benchmarking, client-side API evaluation, knowledge of various deployment strategies
  • Strong knowledge with Core JAVA concepts – Exception handling, Multi-threading, Collection, String, OOPS etc…
  • Advanced understanding of Windows and Linux based operating systems
  • Mainly 3-4 months hands on with reverse engineering and old legacy solutions to new modern applications
  • Working knowledge using REST, HTTP, TCP, SCTP protocols
  • Hands-on with JAVA frameworks such as – Thread Pool Executor, Object Pooling, Logging (Log4j preferred), XML/JSON handling



Education Criteria:

  • Preferred BE degree in CS, E&C, E&E
  • Proficient being a J2EE Developer (courses or project done) and data analytics skills
  • Flexible to work on any projects assigned

 

Note: Terms & Conditions

  • This opportunity will be work from office
Reporting location - Bangalore office, Vijayanagar
Read more
For Prestigious client

For Prestigious client

Agency job
via Talentspro by Punithalayal A
Bengaluru (Bangalore)
1 - 8 yrs
₹4L - ₹20L / yr
Malware analysis
Reverse engineering
 Software Engineer - Malware Analysis with Reverse Engineering
Exp 1 to 8 yrs. Ctc 4 to 20 lpa

A malware analyst examines malicious software, such as bots, worms, and trojans to understand the nature of their threat. This task usually involves reverse-engineering the compiled executable and examining how the program interacts with its environment. The analyst may be asked to document the specimen's attack capabilities, understand its propagation characteristics, and define signatures for detecting its presence. A malware analyst is sometimes called a reverse engineer.

Security product companies, in industries such as anti-virus or network intrusion prevention, may hire malware analysts to develop ways of blocking malicious code. Large organizations in non-security industries may also hire full-time malware analysts to help protect their environment from attacks, or to respond to incidents that involve malicious software. Malware analysis skills are also valued by companies that cannot justify hiring full-time people to perform this work, but who wish their security or IT administrators to be able to examine malicious software when the need arises.

Read more
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort
Why apply via Cutshort?
Connect with actual hiring teams and get their fast response. No spam.
Find more jobs
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort