Experience with secure coding practices and memory safety concepts. Background in code auditing, vulnerability analysis, or exploit development. Experience triaging and resolving bug bounty reports. Knowledge of machine learning techniques applied to security. Familiarity with cryptographic principles, blockchain security, or decentralized systems. Strong problem-solving skills and an offensive security mindset.