{"id":90837,"date":"2026-02-18T12:00:27","date_gmt":"2026-02-18T12:00:27","guid":{"rendered":"https:\/\/jobs.dataaxisnode.com\/kenya\/job\/mobile-security-technician-rider-success-manager\/"},"modified":"2026-02-18T12:00:57","modified_gmt":"2026-02-18T12:00:57","slug":"mobile-security-technician-rider-success-manager","status":"publish","type":"job_listing","link":"https:\/\/jobs.dataaxisnode.com\/kenya\/job\/mobile-security-technician-rider-success-manager\/","title":{"rendered":"Mobile Security Technician \n\n\n            \n\n            \n            Rider Success Manager"},"content":{"rendered":"<p>About The Role<\/p>\n<p>We are looking for a Mobile Security Technician to join our Cyber Security Team, which provides intelligence on hacking of Sun King devices to strengthen and expand the digital and financial inclusion of our customers.<\/p>\n<p>As an ethical hacker, your principal mission will be to identify security loopholes in various vendor smartphones and advise on security considerations. You will test Sun King devices for security flaws, particularly mobile phones, conduct hardware vulnerability reviews of smartphones, IoT and automotive devices, develop custom Proof-of-Concept code, and carry out internal penetration testing across products.<\/p>\n<p>What you will be expected to do:<\/p>\n<p>\tConduct offensive security assessments of hardware, firmware, embedded operating systems, and payment stacks on Sun King mobile devices.<br \/>\n\tReverse engineer firmware and perform static and dynamic reviews to uncover security weaknesses.<br \/>\n\tDetect and exploit vulnerabilities in embedded systems, bootloaders, MDMs, Android kernel components, secure boot implementations, and cryptographic mechanisms.<br \/>\n\tDevelop and execute proof-of-concept attacks to demonstrate exploitability and business impact.<br \/>\n\tWork with product, hardware, and software engineering teams to define secure development practices and strengthen product resilience.<br \/>\n\tContribute to threat modeling and architecture reviews for new products and features.<br \/>\n\tKeep current with emerging vulnerabilities, tools, and offensive research relevant to smartphone financing ecosystems.<\/p>\n<p>You might be a strong candidate if you have:<\/p>\n<p>\tSolid knowledge of Android security, Mobile Device Management, IoT device architectures, and hardware security testing.<br \/>\n\tStrong familiarity with hardware exploitation techniques (e.g., JTAG\/SWD\/UART debugging, side-channel techniques, fault injection).<br \/>\n\tHands-on experience with Flash 64, Pandora, Easy JTag, Chimera, CM2, and similar tools.<br \/>\n\tProficiency in reverse engineering tools such as Ghidra, IDA Pro, Binary Ninja, and debugging tools like JTAGulator, OpenOCD, or Bus Pirate.<br \/>\n\tExperience reviewing and modifying firmware images (binwalk, Firmadyne, QEMU).<br \/>\n\tFamiliarity with secure boot, TPM\/TEE, flash encryption, and other embedded security technologies.<br \/>\n\tProgramming and scripting capability in Python, C\/C++, Bash, or similar languages.<br \/>\n\tKnowledge of common vulnerability classes (e.g., memory corruption, design flaws, insecure update mechanisms).<br \/>\n\tExposure to payment\/fintech device security and secure device provisioning environments.<\/p>\n<p>go to method of application \u00bb<\/p>\n<p>Use the link(s) below to apply on company website. \u00a0<\/p>\n<p>Apply Through:<\/p>\n","protected":false},"author":2,"featured_media":0,"template":"","meta":{"_promoted":"","_job_location":"","_application":"","_company_name":"","_company_website":"","_company_tagline":"","_company_twitter":"","_company_video":"","_filled":0,"_featured":0,"_remote_position":0,"_job_salary":"","_job_salary_currency":"","_job_salary_unit":""},"job_listing_region":[692],"job-categories":[693,764],"job-types":[687],"class_list":{"0":"post-90837","1":"job_listing","2":"type-job_listing","3":"status-publish","4":"hentry","5":"job_listing_region-nairobi","7":"job-type-full-time"},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/jobs.dataaxisnode.com\/kenya\/wp-json\/wp\/v2\/job-listings\/90837","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jobs.dataaxisnode.com\/kenya\/wp-json\/wp\/v2\/job-listings"}],"about":[{"href":"https:\/\/jobs.dataaxisnode.com\/kenya\/wp-json\/wp\/v2\/types\/job_listing"}],"author":[{"embeddable":true,"href":"https:\/\/jobs.dataaxisnode.com\/kenya\/wp-json\/wp\/v2\/users\/2"}],"wp:attachment":[{"href":"https:\/\/jobs.dataaxisnode.com\/kenya\/wp-json\/wp\/v2\/media?parent=90837"}],"wp:term":[{"taxonomy":"job_listing_region","embeddable":true,"href":"https:\/\/jobs.dataaxisnode.com\/kenya\/wp-json\/wp\/v2\/job_listing_region?post=90837"},{"taxonomy":"job_listing_category","embeddable":true,"href":"https:\/\/jobs.dataaxisnode.com\/kenya\/wp-json\/wp\/v2\/job-categories?post=90837"},{"taxonomy":"job_listing_type","embeddable":true,"href":"https:\/\/jobs.dataaxisnode.com\/kenya\/wp-json\/wp\/v2\/job-types?post=90837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}