Smart Contract Auditor (EVM, Rust, Solana, Move)
Skills
Erc-20VyperGasSecurity AuditingUpgradabilityNearAptosCosmwasmErc-721Symbolic ExecutionEcdsaErc-4626Eip-712RadixErc-1155StakingAnchorSolanaEvmFoundryAccess ControlFuzzingSuiBridgeVulnerabilityMoveFormal VerificationReentrancyLendingDefiAmmReportingRustSolidityDynamic AnalysisScryptoUpgradeable ContractStorage LayoutGas MechanicsEchidnaMythrilCertoraAccount AbstractionSmart ContractStatic AnalysisSlither
About the Role
You will perform manual security reviews and static and dynamic analysis of smart contracts. You will identify vulnerabilities such as reentrancy, access control flaws, logic errors and economic exploits, and produce clear audit reports with severity ratings and remediation guidance. You will work with protocol teams to understand business logic, architecture and threat models, contribute to internal tooling and audit methodology, and keep up to date with new exploits and attack vectors.
Requirements
- 2+ years of hands-on experience in smart contract security auditing or development
- Expertise in at least one ecosystem: EVM (Solidity, Vyper, EVM internals), Rust-based (Solana Anchor, CosmWasm, Near, Radix Scrypto) or Move (Aptos, Sui)
- Strong understanding of common vulnerability classes such as reentrancy, access control issues, flash loan attacks and oracle manipulation
- Knowledge of DeFi primitives including AMM, lending protocols, staking and bridges
- Familiarity with token standards and patterns (ERC-20, ERC-721, ERC-1155, ERC-4626) and account abstraction concepts
- Understanding of EVM and blockchain fundamentals including storage layout, call context, gas mechanics and signature schemes (ECDSA, EIP-712)
- Ability to read and reason about complex on-chain systems
- Clear written communication for technical reports
- Nice to have: public audit portfolio, bug bounty findings, CTF achievements or security research
- Nice to have: experience with security tooling such as Slither, Foundry, Echidna, Mythril, Certora, Trident and Anchor testing framework
- Nice to have: experience with fuzzing, formal verification and symbolic execution
- Nice to have: familiarity with MEV, cross-chain bridges, L2 architectures or account abstraction research
Responsibilities
- Perform manual security reviews and static and dynamic analysis of smart contracts
- Identify vulnerabilities including reentrancy, access control flaws, logic errors, economic exploits and protocol specific attack vectors
- Deliver clear, actionable audit reports with severity ratings and remediation guidance
- Collaborate with protocol teams to understand business logic, architecture and threat models
- Contribute to internal tooling, audit methodologies and knowledge base
- Stay current with latest exploits, attack vectors and ecosystem developments
