What are we looking for
We are looking for a talented detection engineer someone who looks at the world differently who explores hunts lives to beat the system and challenge it. Someone who can address tough security problems and deliver solutions quickly.
Why us
Because you will meet extraordinary challenges facing the newest attacks and tech obstacles and overcoming them.
You will work with the very BEST in the industry in a flexible and independent environment.
You will influence the design of a disruptive product that will shape the security industry of tomorrow.
What will you do
You will be responsible for detecting the newest malware and exploits based on SentinelOnes EPP platform. The role includes an end to end responsibility for behaviour based detection capabilities starting from reversing the samples designing new methods to detect or prevent those and implementing it in the product in the end. You will be developing and using internal research tools PoCs and discovering new ways to detect/prevent exploitation attacks (EoP drive-by attacks and more). At the end of the day your deliveries will enhance the security of dozens of millions of Windows endpoints which are protected by our platform.
What experience or knowledge should you bring
- Excellent understanding of the Windows Internals - understanding how core system components (Process and Threads Virtual Memory and more) work behind the scenes.
- 3 years of experience in malware analysis (statically and dynamically)
- 3 years of experience with C
- Proven experience with reverse engineering of x86/x64/ARM binaries.
- Experienced with analysis tools such as: IDA WinDBG SysInternals etc.
- Kernel development experience - advantage
- Python experience - advantage
- Advanced C - advantage
- Understanding of existing AVs internals - advantage.
Required Experience:
Staff IC
What are we looking forWe are looking for a talented detection engineer someone who looks at the world differently who explores hunts lives to beat the system and challenge it. Someone who can address tough security problems and deliver solutions quickly.Why usBecause you will meet extraordinary cha...
What are we looking for
We are looking for a talented detection engineer someone who looks at the world differently who explores hunts lives to beat the system and challenge it. Someone who can address tough security problems and deliver solutions quickly.
Why us
Because you will meet extraordinary challenges facing the newest attacks and tech obstacles and overcoming them.
You will work with the very BEST in the industry in a flexible and independent environment.
You will influence the design of a disruptive product that will shape the security industry of tomorrow.
What will you do
You will be responsible for detecting the newest malware and exploits based on SentinelOnes EPP platform. The role includes an end to end responsibility for behaviour based detection capabilities starting from reversing the samples designing new methods to detect or prevent those and implementing it in the product in the end. You will be developing and using internal research tools PoCs and discovering new ways to detect/prevent exploitation attacks (EoP drive-by attacks and more). At the end of the day your deliveries will enhance the security of dozens of millions of Windows endpoints which are protected by our platform.
What experience or knowledge should you bring
- Excellent understanding of the Windows Internals - understanding how core system components (Process and Threads Virtual Memory and more) work behind the scenes.
- 3 years of experience in malware analysis (statically and dynamically)
- 3 years of experience with C
- Proven experience with reverse engineering of x86/x64/ARM binaries.
- Experienced with analysis tools such as: IDA WinDBG SysInternals etc.
- Kernel development experience - advantage
- Python experience - advantage
- Advanced C - advantage
- Understanding of existing AVs internals - advantage.
Required Experience:
Staff IC
اعرض المزيد
عرض أقل