Security Researcher
Herzliya, Tel Aviv District, IL
Description
Today’s world is crime-riddled. Criminals are everywhere, invisible, virtual, and sophisticated. Traditional ways to prevent and investigate crime and terror are no longer enough…
Technology is changing incredibly fast. The criminals know it, and they are taking advantage. We know it too.
For nearly 30 years, the incredible minds at Cognyte around the world have worked closely together and put their expertise to work, to keep up with constantly evolving technological and criminal trends and help make the world a safer place with leading investigative analytics software solutions.
We are defined by our dedication to doing good and this translates to business success, meaningful work friendships, a can-do attitude, and deep curiosity.
As a Communication Protocols Security Researcher at Cognyte, your day will be filled with stimulating tasks. You’ll start by catching up on the latest in communication protocols. Then, you’ll dive into identifying vulnerabilities and developing strategies to exploit them. You’ll also spend time brainstorming with your team to come up with innovative solutions to complex security problems.
As a Cognyter you will:
- Protocol Analysis: Conduct in-depth research and analysis of various communication protocols to understand their design, implementation, and potential vulnerabilities.
- Reverse Engineering and Vulnerability Research: Apply reverse engineering techniques to deconstruct systems and understand their inner workings and Conduct research to discover new vulnerabilities in various systems and technologies.
- Solution Implementation: Translate your research findings into practical solutions and implement them in our products.
- Product Development: Contribute to the advancement of Cognyte’s products by staying abreast of the latest developments in the field and innovating new features and improvements.
- Communication Protocols and Wireless Attacks: work with a variety of communication protocols such as WPA2, WAP3, BLE, BT classic, NFC, RFID, satellite protocols, and more.
Requirements
For that mission you’ll need:
- Minimum of 4 years of experience as a Security Researcher.
- Proficiency in Python and C/C++ is required. Knowledge of Java is an advantage.
- Familiarity with Linux is required.
- Experience with Assembly, ARM, and x86. Familiarity with rare/unique DSPs - an advantage.
- Experience with Android/iOS is an advantage.
- Familiarity with Wifi and Bluetooth protocols is an advantage.
- Experience with IDA/Ghidra is an advantage.
- Experience in reversing of applications is an advantage.
Remember: When you're curious enough, you don't need to check every box to apply. Be in touch!
We believe that diverse teams drive the greatness of ideas, products, and companies. Whatever your gender, age, race, creed, or taste in music – if you're curious enough, you don't need to check every box to apply. We’re waiting for you. Apply now.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Analytics Android C Exploit Ghidra iOS Java Linux Python Reverse engineering Vulnerabilities
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.