עדיין מחפשים עבודה במנועי חיפוש? הגיע הזמן להשתדרג!
במקום לעבור לבד על אלפי מודעות, Jobify מנתחת את קורות החיים שלך ומציגה לך רק משרות שבאמת מתאימות לך.
מעל 80,000 משרות • 4,000 חדשות ביום
חינם. בלי פרסומות. בלי אותיות קטנות.
About Cyberillium
Cyberillium offers high-end security research services for customers who want to build secure products. We conduct in-depth research and reverse engineering on various technologies, including embedded software and web applications.
Founded by an elite group of Israeli security researchers, we deliver cutting-edge cyber solutions to enterprises of all sizes. In addition to our research group, we are developing a unique cybersecurity product designed to bring a completely new approach to the cyber market.
Why Cyberillium
By joining us, you’ll shape with us the DNA of a fast-growing company. Working with some of the best cyber talents in Israel you will help us solve the ‘unsolvable’ problems for our highly technical clients.
Description (What you’ll do)
- 0-day vulnerability research and exploitation on various systems from embedded devices to modern systems with full mitigations in teams of 1-4.
- Perform technological deep dives to find innovative solutions to low-level secure systems design problems.
- Actively document efforts as you go (code / Wiki / attack tree) to assist yourself and others in learning from and maintaining your progress.
- Write detailed research reports summarizing your research outputs for our customers.
- Voice your thoughtful and innovative ideas for additional research and development projects.
- Use and develop in-house cutting-edge technologies for vulnerability research.
Expected Skills and Experience:
- +4 years working as a cybersecurity researcher.
- Deep knowledge of operation systems internals (Linux / Windows / iOS / Android / etc.).
- Experience in reverse engineering of complex systems.
- Experience in 0-day research of large systems (with or without sources). Familiarity with different kinds of vulnerabilities - OOB, Double Free, UAF, Logic vulnerabilities, Injection, Races, Type confusion, Timing attacks, de-synchronization, etc.
- Heap and stack exploitation experience in fully mitigated systems.
- Be hands-on: experience with research tools such as gdb, IDA / ghidra, Frida, windbg, QEMU, ftrace, Wireshark, etc.
- Experience developing in Python and C, as well as compiling shellcodes.
- A quick learner, ready to work in an agile, fast-paced, multi-task environment.
- A team player with strong communication skills.
- Familiarity with cryptography and cryptographic algorithms will be a plus.
- High level of written and spoken English.
במקום לעבור לבד על אלפי מודעות, Jobify מנתחת את קורות החיים שלך ומציגה לך רק משרות שבאמת מתאימות לך.
מעל 80,000 משרות • 4,000 חדשות ביום
חינם. בלי פרסומות. בלי אותיות קטנות.