NTU is looking Research Associates and Research Scientists

Nanyang Technological University (Computer Security Lab) – Singapore is looking Research Associates and Research Scientists with the following requirements:

Applicants should have at least a Bachelors degree preferably with 2nd class Honours and above in Computer Science / Computer Engineering / Infocomm Technology / Information Science or a related field with at least 3 years of work experience in a related field for the Research Associate position and at least 6 years for the Research Scientist position. Applicants with relevant Masters or higher qualifications without the minimum experience will also be considered.

We expect that a candidate would be able to work independently or in a team, possess strong problem-solving and debugging skills as well as a high level of drive and initiative. Strong written and verbal communication skills would be desirable.

Entry level and starting salary will depend on the candidate’s qualifications and experience. Applicants are invited to send in their detailed CV together with the following completed application form:


to Dr Peter Loh at: askkloh@ntu.edu.sg

The job is open to Singaporean as well as foreigner. The announcement was originally posted at linkedin.

Finally … Microsoft is offering Blue Hat Prize


At the Black Hat Conference 2011, Katie Moussouris who leads the Security Community Outreach and Strategy team at Microsoft announced Blue Hat Prize with the following detail below:

Microsoft event offer this prize to whoever (from 14 years of age up)  can find the mitigation technology that is able to prevent the exploitation of memory vulnerabilities.  This is the first time, Microsoft provides such money for finding the vulnerabilities and mitigation technology for the related vulnerabilities.  Generally, security researchers have 3 purposes as shown below:

Microsoft intend to fulfill these 3 purposes and Microsoft intend to have the Intellectual Property still attached to the inventor as the recognition.  Some of the example of mitigation technology that already helped developers to further provide secure code as shown below:

These tools can be found as a collection knows as Enhanced Mitigation Experience Toolkit (EMET) and can be downloaded from here.  The Black Hat 2011 Summary Webcast be be viewed here.  Are you ready for the challenges?  To get more detail about the Blue Hat Prize, go to the following link.