We are looking for an all-around offsec attack researcher to join our group and become part of the revolution.
Roles and Responsibilities:
Conduct state of the art research on windows platforms and be one step ahead of real threat actors in areas such as AV/EDR evasion, subvert communication channels, binary exploitation and vulnerability research.
Integrate the research outputs into attack platforms for enhancing the automation ecosystem with new attack capabilities.
Develop decision-making algorithms to bridge the gap between an automated system and an experienced human attacker
Develop production-ready attack capabilities. What development language is relevant? WHATEVER IT TAKES!
Python, C/C++, CSharp, Java, Office Macros, Bash, Powershell, Go, Assembly,
Mentor other members of the R&D team.
So, can we offer you the red pill and join our journey to create the ultimate automated hacker?
Roles and Responsibilities:
Conduct state of the art research on windows platforms and be one step ahead of real threat actors in areas such as AV/EDR evasion, subvert communication channels, binary exploitation and vulnerability research.
Integrate the research outputs into attack platforms for enhancing the automation ecosystem with new attack capabilities.
Develop decision-making algorithms to bridge the gap between an automated system and an experienced human attacker
Develop production-ready attack capabilities. What development language is relevant? WHATEVER IT TAKES!
Python, C/C++, CSharp, Java, Office Macros, Bash, Powershell, Go, Assembly,
Mentor other members of the R&D team.
So, can we offer you the red pill and join our journey to create the ultimate automated hacker?
Requirements:
5+ Years of experience in Windows Internals or kernel development.
5+ Years of experience with C89 and above and C++ 11 and above
3+ Years of experience in Python development
Experience writing low-level code optimized for performance constraints of time, memory, storage and stealth
Experience with EDRs evasion
Knowledge of modern code and latest Windows APIs
Binary analysis with IDA/Radare2
Binary debugging with WinDBG
Binary exploitation
Excellent teamwork skills
Fast learner and quick on adapting to new technologies and fields
Preferred skills:
IDF cyber team veteran
Practical experience in red/blue team engagements
Experience and passion for cyber oriented research
Experience with working in Agile Methodology
Experience in the development of security products
Experience in the following attack areas:
ARM/PPC reversing
EPP evasion and handling
Kernel debugging
Hands-on experience with the Java development language
Bachelors degree in Computer Science or a related field
5+ Years of experience in Windows Internals or kernel development.
5+ Years of experience with C89 and above and C++ 11 and above
3+ Years of experience in Python development
Experience writing low-level code optimized for performance constraints of time, memory, storage and stealth
Experience with EDRs evasion
Knowledge of modern code and latest Windows APIs
Binary analysis with IDA/Radare2
Binary debugging with WinDBG
Binary exploitation
Excellent teamwork skills
Fast learner and quick on adapting to new technologies and fields
Preferred skills:
IDF cyber team veteran
Practical experience in red/blue team engagements
Experience and passion for cyber oriented research
Experience with working in Agile Methodology
Experience in the development of security products
Experience in the following attack areas:
ARM/PPC reversing
EPP evasion and handling
Kernel debugging
Hands-on experience with the Java development language
Bachelors degree in Computer Science or a related field
This position is open to all candidates.