עדיין מחפשים עבודה במנועי חיפוש? הגיע הזמן להשתדרג!
במקום לחפש לבד בין מאות מודעות – תנו ל-Jobify לנתח את קורות החיים שלכם ולהציג לכם רק הזדמנויות שבאמת שוות את הזמן שלכם מתוך מאגר המשרות הגדול בישראל.
השימוש חינם, ללא עלות וללא הגבלה.
About Cyberillium
Cyberillium offers high-end security research and R&D services for customers who want to build secure products. We conduct in-depth research, architecture design, and low-level development across a wide range of technologies.
Founded by an elite group of Israeli security researchers, we deliver cutting-edge cyber solutions to enterprises of all sizes and the Israeli government. In addition to our services group, we are developing a unique cybersecurity product designed to bring a completely new approach to the cyber market.
Why Cyberillium
By joining us, you'll help shape the DNA of a fast-growing company. Working with some of the best cyber talent in Israel, you will help us solve 'unsolvable' problems for our highly technical clients.
Description (What You’ll Do)
- Perform technological deep dives to find innovative solutions to low-level secure systems design problems.
- Develop novel low-level solutions to unique problems.
- Conduct 0-day vulnerability research and exploitation on various systems (from embedded devices to modern systems with full mitigations) in teams of 1-4
- Actively document efforts (code/Wiki/attack tree) to assist yourself and others in learning from and maintaining your progress
- Write detailed research reports summarizing your research outputs for our customers.
- Voice your thoughtful and innovative ideas for additional research and development projects.
- Use and develop in-house cutting-edge technologies for vulnerability research.
Expected Skills and Experience:
- 4+ years working as a low-level engineer or as a cybersecurity researcher.
- Deep knowledge of operation systems internals (Linux / Windows / iOS / Android / etc.).
- Experience in reverse engineering of complex systems.
- Experience developing in Python and C.
- Hands-on approach: experience with research tools such as gdb, IDA / ghidra, Frida, windbg, QEMU, ftrace, Wireshark, etc.
- Quick learner, ready to work in an agile, fast-paced, multi-task environment.
- Team player with strong communication skills.
- High level of written and spoken English.
- Plus: Experience working with hardware.
- Plus: Experience in 0-day research of large systems (with or without sources). Familiarity with different kinds of vulnerabilities - OOB, Double Free, UAF, Logic vulnerabilities, Injection, Races, Type confusion, Timing attacks, de-synchronization, etc.
- Plus: Heap and stack exploitation experience in fully mitigated systems.
- Plus: Familiarity with cryptography and cryptographic algorithms.
במקום לחפש לבד בין מאות מודעות – תנו ל-Jobify לנתח את קורות החיים שלכם ולהציג לכם רק הזדמנויות שבאמת שוות את הזמן שלכם מתוך מאגר המשרות הגדול בישראל.
השימוש חינם, ללא עלות וללא הגבלה.