You arrive at the meeting location. It's dark. The handoff is scheduled to take place at 10 p.m. The several unicorns arrive, but you don't see the flag. They approach you and the first one says, "push eax, call joke." The second says, "jalr blankstare." They stare at each other. They stare at you. They aren't speaking the same language.
Connect via nc 184.108.40.206 4567 and figure out how to talk to the unicorns and reveal the flag.
Hardware Security Engineers
Do you like working with microelectronics?
Design test articles for hardware security research, and design new prototype methods including electrical, optical, and other sensing modalities for assessing physical and architectural security properties of microelectronics and embedded systems.
Vulnerability Researchers and Reverse Engineers
Do you like understanding how things work and break?
Discover vulnerabilities and debug programs with tools like gdb or QIRA, create automated, scalable and reverse engineering tools and pipelines. Use and build vulnerability research tools that push past the edge of current tools and techniques.
Embedded, Software, Systems, and Network Engineers
Do you like assessing and evaluating new technology?
Provide advanced day-to-day systems analysis and support for monitoring, troubleshooting, configuring, reporting, implementing, installing, and upgrading core infrastructure hardware, storage, software and/or server-based applications
Program Management and Technical Positions
Do you like understanding delivering critical services to support our clients?
Lead the project team with ultimate responsibility for meeting technical, cost schedule, quality, financial and contractual performance. Conduct research and development, manage laboratories, design and manufacture products.