top of page

תיאור המשרה

About the Role:
We are looking for an all-around offsec attack researcher to join our group and become part of the revolution.
Roles and Responsibilities:
Conduct state of the art research on windows platforms and be one step ahead of real threat actors in areas such as AV/EDR evasion, subvert communication channels, binary exploitation and vulnerability research.
Integrate the research outputs into attack platforms for enhancing the automation ecosystem with new attack capabilities.
Develop decision-making algorithms to bridge the gap between an automated system and an experienced human attacker
Develop production-ready attack capabilities. What development language is relevant? WHATEVER IT TAKES!
Python, C/C++, CSharp, Java, Office Macros, Bash, Powershell, Go, Assembly,…
Mentor other members of the R&D team.
So, can we offer you the red pill and join our journey to create the ultimate automated hacker?

דרישות התפקיד

5+ Years of experience in Windows Internals or kernel development.
5+ Years of experience with C89 and above and C++ 11 and above
3+ Years of experience in Python development
Experience writing low-level code optimized for performance constraints of time, memory, storage and stealth
Experience with EDRs evasion
Knowledge of modern code and latest Windows APIs
Binary analysis with IDA/Radare2
Binary debugging with WinDBG
Binary exploitation
Excellent teamwork skills
Fast learner and quick on adapting to new technologies and fields

Windows Internals Attack Researcher

הגשת מועמדות מותנית באישור נציג משאבי אנוש. אם טרם קבעת ראיון, עשה זאת דרך האזור האישי

היקף משרה

מלאה

מודל עבודה

היברידי

תחום

אבטחת מידע וסייבר

תת-תחום

אחר

Add a Title

Add a Title

משרות נוספות

bottom of page