עדיין מחפשים עבודה במנועי חיפוש? הגיע הזמן להשתדרג!
במקום לחפש לבד בין מאות מודעות – תנו ל-Jobify לנתח את קורות החיים שלכם ולהציג לכם רק הזדמנויות שבאמת שוות את הזמן שלכם מתוך מאגר המשרות הגדול בישראל.
השימוש חינם, ללא עלות וללא הגבלה.
A well-established cybersecurity startup specializing in offensive security provides its customers with a comprehensive cyber platform that allows full visibility into breach activities including how many targets were compromised and what data was obtained.
The platform primarily focuses on Windows and Mobile environments, covering endpoints such as desktops, laptops, and cloud accounts.
The company was founded about a decade ago by senior leaders from the cybersecurity industry and has grown steadily since.
Located in Tel Aviv, operates in a hybrid model with two work-from-home days, and employs hundreds of employees all based in Israel.
The Role:
- You will be part of a research team responsible for both classic (manual) research and automated research.
- All research and development processes are built fully in-house, without relying on external tools or third-party solutions.
Key Responsibilities-
- Deep research into operating systems and low-level internals
- Analysis of protocols and system behavior
- Low-level vulnerability research, including exploit development
- Building proofs of concept (PoCs)
- Hands-on development using Python, C, C++, and Assembly
Requirements-
- 3+ years of experience in reverse engineering (userland and/or kernel).
- Proven experience analyzing application internals and security mechanisms.
- Proficiency in Python for developing research tools, automation, and PoCs
- Hands-on experience with at least one major RE tool (IDA Pro or Ghidra).
- Solid understanding of system internals.
- Strong independent, precise, and systematic work style, with ability to collaborate.
במקום לחפש לבד בין מאות מודעות – תנו ל-Jobify לנתח את קורות החיים שלכם ולהציג לכם רק הזדמנויות שבאמת שוות את הזמן שלכם מתוך מאגר המשרות הגדול בישראל.
השימוש חינם, ללא עלות וללא הגבלה.