We are looking for a talented detection engineer, someone who looks at the world differently, who explores, hunts, lives to beat the system and challenge it. Someone who can address tough security problems and deliver solutions quickly.
What will you do?
You will be responsible for detecting the newest malware and exploits based on SentinelOnes EPP platform. The role includes an end to end responsibility for behaviour based detection capabilities, starting from reversing the samples, designing new methods to detect or prevent those, and implementing it in the product in the end. You will be developing and using internal research tools, PoCs and discovering new ways to detect/prevent exploitation attacks (EoP, drive-by attacks and more). At the end of the day, your deliveries will enhance the security of dozens of millions of Windows endpoints which are protected by our platform.
What will you do?
You will be responsible for detecting the newest malware and exploits based on SentinelOnes EPP platform. The role includes an end to end responsibility for behaviour based detection capabilities, starting from reversing the samples, designing new methods to detect or prevent those, and implementing it in the product in the end. You will be developing and using internal research tools, PoCs and discovering new ways to detect/prevent exploitation attacks (EoP, drive-by attacks and more). At the end of the day, your deliveries will enhance the security of dozens of millions of Windows endpoints which are protected by our platform.
Requirements:
Excellent understanding of the Windows Internals – understanding how core system components (Process and Threads, Virtual Memory and more) work behind the scenes.
3+ years of experience in malware analysis (statically and dynamically)
3+ years of experience with C++
Proven experience with reverse engineering of x86/x64/ARM binaries.
Experienced with analysis tools, such as: IDA, WinDBG, SysInternals etc.
Kernel development experience – advantage
Python experience – advantage
Advanced C++ – advantage
Understanding of existing AVs internals – advantage.
Excellent understanding of the Windows Internals – understanding how core system components (Process and Threads, Virtual Memory and more) work behind the scenes.
3+ years of experience in malware analysis (statically and dynamically)
3+ years of experience with C++
Proven experience with reverse engineering of x86/x64/ARM binaries.
Experienced with analysis tools, such as: IDA, WinDBG, SysInternals etc.
Kernel development experience – advantage
Python experience – advantage
Advanced C++ – advantage
Understanding of existing AVs internals – advantage.
This position is open to all candidates.


















