SentinelOne is shaping the future of endpoint security through its unified converged platform that automatically prevents detects and responds to threats in real-time. Our unique approach is based on deep inspection of all system processes combined with innovative machine learning to quickly isolate malicious behaviours protecting devices against advanced targeted threats in real time.
What are we looking for
We are looking for talented detection engineers people who look at the world differently who explore hunt live to beat the system and challenge it. People who can address tough security problems and deliver it fastly.
Why us
Because you will meet extraordinary challenges facing the newest attacks and tech obstacles and overcoming them.
You will work with the very BEST in the industry in a flexible and independent environment.
You will influence the design of a disruptive product that will shape the security industry of tomorrow.
What will you do
You will be responsible for detecting the newest malware and exploits based on SentinelOnes EPP platform. The role includes an end to end responsibility for behaviour based detection capabilities starting from reversing the samples designing new methods to detect or prevent those and implementing it in the product in the end. You will be developing and using internal research tools PoCs and discovering new ways to detect/prevent exploitation attacks (EoP drive-by attacks and more). At the end of the day your deliveries will enhance the security of dozens of millions of Windows endpoints which are protected by our platform.
What experience or knowledge should you bring
- Excellent understanding of the Windows Internals - understanding how core system components (Process and Threads Virtual Memory and more) work behind the scenes.
- 3 years of experience in malware analysis (statically and dynamically)
- 3 years of experience with C
- Proven experience with reverse engineering of x86/x64/ARM binaries.
- Experienced with analysis tools such as: IDA WinDBG SysInternals etc.
- Kernel development experience - advantage
- Python experience - advantage
- Advanced C - advantage
- Understanding of existing AVs internals - advantage.
Required Experience:
Senior IC
SentinelOne is shaping the future of endpoint security through its unified converged platform that automatically prevents detects and responds to threats in real-time. Our unique approach is based on deep inspection of all system processes combined with innovative machine learning to quickly isolate...
SentinelOne is shaping the future of endpoint security through its unified converged platform that automatically prevents detects and responds to threats in real-time. Our unique approach is based on deep inspection of all system processes combined with innovative machine learning to quickly isolate malicious behaviours protecting devices against advanced targeted threats in real time.
What are we looking for
We are looking for talented detection engineers people who look at the world differently who explore hunt live to beat the system and challenge it. People who can address tough security problems and deliver it fastly.
Why us
Because you will meet extraordinary challenges facing the newest attacks and tech obstacles and overcoming them.
You will work with the very BEST in the industry in a flexible and independent environment.
You will influence the design of a disruptive product that will shape the security industry of tomorrow.
What will you do
You will be responsible for detecting the newest malware and exploits based on SentinelOnes EPP platform. The role includes an end to end responsibility for behaviour based detection capabilities starting from reversing the samples designing new methods to detect or prevent those and implementing it in the product in the end. You will be developing and using internal research tools PoCs and discovering new ways to detect/prevent exploitation attacks (EoP drive-by attacks and more). At the end of the day your deliveries will enhance the security of dozens of millions of Windows endpoints which are protected by our platform.
What experience or knowledge should you bring
- Excellent understanding of the Windows Internals - understanding how core system components (Process and Threads Virtual Memory and more) work behind the scenes.
- 3 years of experience in malware analysis (statically and dynamically)
- 3 years of experience with C
- Proven experience with reverse engineering of x86/x64/ARM binaries.
- Experienced with analysis tools such as: IDA WinDBG SysInternals etc.
- Kernel development experience - advantage
- Python experience - advantage
- Advanced C - advantage
- Understanding of existing AVs internals - advantage.
Required Experience:
Senior IC
اعرض المزيد
عرض أقل