עדיין מחפשים עבודה במנועי חיפוש? הגיע הזמן להשתדרג!
במקום לעבור לבד על אלפי מודעות, Jobify מנתחת את קורות החיים שלך ומציגה לך רק משרות שבאמת מתאימות לך.
מעל 80,000 משרות • 4,000 חדשות ביום
חינם. בלי פרסומות. בלי אותיות קטנות.
Key Responsibilities:
* Conduct in-depth research and analysis of n-day vulnerabilities to assess risk and potential impact.
* Investigate attack vectors across various operating systems and cloud environments (IaaS/SaaS).
* Define and document mitigation strategies for discovered attack techniques, collaborating with development teams for implementation.
* Drive the integration of research findings into product features, ensuring enhanced security capabilities.
* Stay abreast of the latest security trends, technologies, and best practices to maintain expertise in the field.
* Collaborate with cross-functional teams to communicate and implement identified attacks, techniques, and solutions.
* Contribute to public security research through blog posts and potentially present findings at industry conferences.
Qualifications:
* A minimum of 5+ years of experience in security research, penetration testing, red teaming, or related fields.
* Strong knowledge of adversary tactics, techniques, and procedures (TTPs).
* Proficiency with common protocols (e.g., TCP/IP, HTTP, LDAP, Kerberos, RPC, SSL, SSH) and deep knowledge of Windows, Linux, or macOS internals.
* Competence in programming languages such as C / C ++, JAVA, TypeScript, or Python.
* Demonstrated ability to manage and drive complex research projects independently and collaboratively.
* Self-motivated, with a passion for continuous learning and professional development. Preferred Qualifications:
* Bachelors degree in Computer Science or equivalent experience (military background is a plus).
* Familiarity with cloud platforms (AWS, GCP, Azure) and container orchestration systems like Kubernetes.
* Experience with developing, extending, or modifying exploits, shellcode or exploit tools.
* Reverse engineering skills, including familiarity with debuggers and disassemblers.
* Relevant industry certifications such as OSCP, OSCE, OSWE, or similar credentials.
* Experience in source code review to identify control flow and security vulnerabilities.
במקום לעבור לבד על אלפי מודעות, Jobify מנתחת את קורות החיים שלך ומציגה לך רק משרות שבאמת מתאימות לך.
מעל 80,000 משרות • 4,000 חדשות ביום
חינם. בלי פרסומות. בלי אותיות קטנות.
משרות נוספות מומלצות עבורך
-
Senior Researcher
-
תל אביב - יפו
Discreet Company
-
-
Senior Security Researcher
-
תל אביב - יפו
Island
-
-
Senior Security Researcher - Risk
-
תל אביב - יפו
Tenable
-
-
Principal/ Senior Security Researcher Linux & API Security EDR (Cortex)
-
תל אביב - יפו
Palo Alto Networks
-
-
Principal/ Senior Security Researcher Linux & API Security EDR (Cortex)
-
תל אביב - יפו
Palo Alto Networks
-
-
Senior Security Researcher - Enterprise Security Research
-
תל אביב - יפו
Akamai Technologies
-