Search by job, company or skills

Tencent

OFS - Client Security Engineer (3rd Party Contract - 1 Year Renewable)

new job description bg glownew job description bg glownew job description bg svg
  • Posted a day ago
  • Be among the first 10 applicants
Early Applicant

Job Description

About Tencent

Tencent is an Internet-based platform company founded in Shenzhen, China, in 1998. We use technology to enrich the lives of Internet users and assist the digital upgrade of enterprises. Our mission is Value for Users, Tech for Good. We embrace a culture of teamwork & creativity and are driven by our values - Integrity, Proactivity, Collaboration and Creativity.

We are rapidly expanding our international operations and are looking for top talent to propel us forward. Combining the results-oriented nature of a start-up with the resources of a profitable and leading Internet company, Tencent offers a unique opportunity for aspiring individuals to thrive.

Job Responsibilities

  • Perform in-depth static and dynamic reverse engineering of malware, cheats, trojans, and hacking tools; analyze core mechanisms, communication protocols, exploitation methods, and obfuscation techniques.
  • Write high-quality vulnerability analysis reports, reverse engineering reports, and detection rules (e.g., YARA), while promoting and implementing remediation and protective measures.
  • Proactively track and monitor black-market activity, including production, distribution, and sales channels of cheats (e.g., private servers, cheat marketplaces, gold farming studios).
  • Study the technical evolution, organizational structures, business models, and financial flows of black-market operations to create comprehensive ecosystem maps.
  • Monitor domestic and international darknet marketplaces, underground forums, and other illicit hubs; analyze communications to provide early warnings of potential attacks, data breaches, or novel cheating methods.

Job Requirements

  • Minimum 3 years of solid reverse engineering experience on Windows, Linux, or Android platforms; proficient with mainstream tools such as IDA Pro, Ghidra, OllyDbg, x64dbg, and WinDbg.
  • Expertise in x86/x64/ARM assembly language; strong understanding of compiled C/C++ program structure and skills in code analysis and logic reconstruction.
  • Practical experience in software vulnerability analysis (e.g., stack overflow, UAF) or unpacking complex packers/VMs is highly preferred.
  • First-hand, in-depth research experience in at least one black-market field, such as game cheating, e-commerce brushing, financial fraud, or data theft.
  • Familiarity with common cheat techniques (e.g., memory modification, API Hooking, packet tampering, click simulation) and the full cheat lifecycle from production to monetization.
  • Practical experience accessing and gathering intelligence from the darknet (e.g., Tor network) or core underground forums.
  • Strong systematic thinking: able to connect individual samples to broader attack organizations and business models.
  • Passion for technical details with the ability to identify subtle clues and investigate root causes.
  • Self-driven and capable of solving problems in ambiguous scenarios without direct supervision.

Preferred Qualifications (Bonus Points)

  • Programming skills in Python, C++, or Go; able to develop automated analysis scripts or PoC tools.
  • Experience in reverse engineering or black-market research on mobile applications (Android/iOS).
  • Understanding of network protocol analysis, with experience using tools like Wireshark to analyze malicious traffic.
  • Familiarity with large-scale AI models and applications is a significant plus.

More Info

Job Type:
Industry:
Function:
Employment Type:

About Company

Job ID: 135865185