<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: red_balloon</title><link>https://news.ycombinator.com/user?id=red_balloon</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 01 May 2026 23:31:53 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=red_balloon" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by red_balloon in "Ask HN: Who is hiring? (May 2026)"]]></title><description><![CDATA[
<p>Red Balloon Security | Security Researchers, Software Engineers | NYC, Northern Virginia | ONSITE, HYBRID | Full-time, Interns (paid) | US Citizenship Required | <a href="https://redballoonsecurity.com" rel="nofollow">https://redballoonsecurity.com</a><p>We are a team of expert researchers and engineers focused on securing embedded devices. We work with partners across critical industries, and on government-funded research programs (think DARPA). "Full-stack" for us doesn't just stop at back end code; it means being comfortable with operating systems, firmware, and signals going over the wire. You'll succeed here if you are a quick learner who loves working independently on tough, technical problems nobody has ever solved before.<p>Day-to-day tasks might include:<p>* Tearing apart a device in our lab, reverse engineering its firmware, and finding security vulnerabilities<p>* Developing an automated, robotic platform for hardware reverse engineering (custom hardware, vision models, user interfaces, etc.)<p>* Hooking and patching RTOS kernel functions to execute defensive device integrity validation code, without violating real-time requirements<p>* Building scalable servers for processing millions of device telemetry messages across thousands of concurrent connections<p>* Maintaining open-source reverse engineering tools (like OFRAK <a href="https://ofrak.com" rel="nofollow">https://ofrak.com</a>) and cooking up fun demos for hacker conferences (like this web game we built for DEF CON in 2023 <a href="https://ofrak.com/tetris/" rel="nofollow">https://ofrak.com/tetris/</a>)<p>Our main office is in Manhattan, but we are building out a new office in Northern Virginia. US citizenship required. Bonus points if you have an active security clearance, or are willing to get one.<p>Be sure to mention Hacker News in your application.<p><a href="https://redballoonsecurity.com/careers/" rel="nofollow">https://redballoonsecurity.com/careers/</a></p>
]]></description><pubDate>Fri, 01 May 2026 17:39:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=47977643</link><dc:creator>red_balloon</dc:creator><comments>https://news.ycombinator.com/item?id=47977643</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47977643</guid></item><item><title><![CDATA[New comment by red_balloon in "Ask HN: Who is hiring? (April 2026)"]]></title><description><![CDATA[
<p>Red Balloon Security | Security Researchers, Software Engineers | NYC, Northern Virginia | ONSITE, HYBRID | Full-time, Interns (paid) | US Citizenship Required | <a href="https://redballoonsecurity.com" rel="nofollow">https://redballoonsecurity.com</a><p>We are a team of expert researchers and engineers focused on securing embedded devices. We work with partners across critical industries, and on government-funded research programs (think DARPA). "Full-stack" for us doesn't just stop at back end code; it means being comfortable with operating systems, firmware, and signals going over the wire. You'll succeed here if you are a quick learner who loves working independently on tough, technical problems nobody has ever solved before.<p>Day-to-day tasks might include:<p>* Tearing apart a device in our lab, reverse engineering its firmware, and finding security vulnerabilities<p>* Developing an automated, robotic platform for hardware reverse engineering (custom hardware, vision models, user interfaces, etc.)<p>* Hooking and patching RTOS kernel functions to execute defensive device integrity validation code, without violating real-time requirements<p>* Building scalable servers for processing millions of device telemetry messages across thousands of concurrent connections<p>* Maintaining open-source reverse engineering tools (like OFRAK <a href="https://ofrak.com" rel="nofollow">https://ofrak.com</a>) and cooking up fun demos for hacker conferences (like this web game we built for DEF CON in 2023 <a href="https://ofrak.com/tetris/" rel="nofollow">https://ofrak.com/tetris/</a>)<p>Our main office is in Manhattan, but we are building out a new office in Northern Virginia. US citizenship required. Bonus points if you have an active security clearance, or are willing to get one.<p><a href="https://www.linkedin.com/jobs/view/4367488549" rel="nofollow">https://www.linkedin.com/jobs/view/4367488549</a></p>
]]></description><pubDate>Wed, 01 Apr 2026 21:40:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=47606879</link><dc:creator>red_balloon</dc:creator><comments>https://news.ycombinator.com/item?id=47606879</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47606879</guid></item></channel></rss>