We are looking for a Principal Linux Security Researcher for our Tel Aviv R&D center, to work on cortex-xdr for linux, which provides runtime protection to servers and cloud workloads.
You will be part of a team that is in charge of researching, developing and improving Anti-Exploit capabilities, Anti-malware capabilities. The position includes researching OS internals, exploits, malware, delving into cloud security, and finding ways to mitigate new attack vectors.
Your Impact:
Research, develop, and improve anti-exploitation mitigations and anti-malware modules – ranging from low-level mitigations up to tackling application-level security vulnerabilities
Work on the design, evaluation, and implementation of new security technologies
Research Linux OS internals, kernel, application codebases, vulnerabilities and exploits (both for internal usage and for PR)
Analyze customer issues to help with detecting and preventing malicious activities in our customers networks.
You will be part of a team that is in charge of researching, developing and improving Anti-Exploit capabilities, Anti-malware capabilities. The position includes researching OS internals, exploits, malware, delving into cloud security, and finding ways to mitigate new attack vectors.
Your Impact:
Research, develop, and improve anti-exploitation mitigations and anti-malware modules – ranging from low-level mitigations up to tackling application-level security vulnerabilities
Work on the design, evaluation, and implementation of new security technologies
Research Linux OS internals, kernel, application codebases, vulnerabilities and exploits (both for internal usage and for PR)
Analyze customer issues to help with detecting and preventing malicious activities in our customers networks.
Requirements:
In-depth knowledge of some operating system internals is a must. Knowledge of Linux is an advantage
Development experience in C/C++/Rust is a must, 2 years at least
Experience in reverse engineering – both static and dynamic, is a must (x86/64 architectures), 3 years at least
Development knowledge in some scripting languages is a must – Experience with Python is an advantage
Exploitation experience is an advantage (either application-level security or memory corruption)
Experience with Kubernetes and cloud workloads is an advantage
Ability to work independently and as a part of a team
Strong attention to detail
Ability to take initiative.
In-depth knowledge of some operating system internals is a must. Knowledge of Linux is an advantage
Development experience in C/C++/Rust is a must, 2 years at least
Experience in reverse engineering – both static and dynamic, is a must (x86/64 architectures), 3 years at least
Development knowledge in some scripting languages is a must – Experience with Python is an advantage
Exploitation experience is an advantage (either application-level security or memory corruption)
Experience with Kubernetes and cloud workloads is an advantage
Ability to work independently and as a part of a team
Strong attention to detail
Ability to take initiative.
This position is open to all candidates.