Windows Internals Attack Researcher

Petah Tikva, Israel, IL

Pentera

Pentera: Don't assume, validate. With Automated Security Validation™, ensure 'pretty certain' means secure. Trusted by top CISOs.

View all jobs at Pentera

Apply now Apply later

Description

Accelerate Your Career in Cybersecurity

Join Pentera and take your career to the next level in cybersecurity. As a leader in Automated Security Validation, we help businesses around the world safely emulate real-world attacks to uncover their vulnerabilities—just like the world’s best red teams. At Pentera, you’ll be at the forefront of cybersecurity innovation, working on advanced tools that challenge organizations' defenses and push the limits of security testing.

With over 350 team members and 1,000+ customers in more than 50 countries, Pentera is a growing company supported by top investors like Insight Partners, K1, and The Blackstone Group.

If you're looking to grow your skills, make a difference, and be part of an innovative team, Pentera is the place for you.


About the Role:

We are looking for an all-around offsec attack researcher to join our group and become part of the revolution.

Roles and Responsibilities:

  • Conduct state of the art research on windows platforms and be one step ahead of real threat actors in areas such as AV/EDR evasion, subvert communication channels, binary exploitation and vulnerability research.
  • Integrate the research outputs into attack platforms for enhancing the automation ecosystem with new attack capabilities.
  • Develop decision-making algorithms to bridge the gap between an automated system and an experienced human attacker
  • Develop production-ready attack capabilities. What development language is relevant? WHATEVER IT TAKES!
  • Python, C/C++, CSharp, Java, Office Macros, Bash, Powershell, Go, Assembly,…
  • Mentor other members of the R&D team.

So, can we offer you the red pill and join our journey to create the ultimate automated hacker?

Requirements

  • 5+ Years of experience in Windows Internals or kernel development.
  • 5+ Years of experience with C89 and above and C++ 11 and above
  • 3+ Years of experience in Python development
  •  Experience writing low-level code optimized for performance constraints of time, memory, storage and stealth
  • Experience with EDRs evasion
  • Knowledge of modern code and latest Windows APIs
  • Binary analysis with IDA/Radare2
  • Binary debugging with WinDBG
  • Binary exploitation
  • Excellent teamwork skills
  • Fast learner and quick on adapting to new technologies and fields

 

Preferred skills:

  • IDF cyber team veteran 
  • Practical experience in red/blue team engagements
  • Experience and passion for cyber oriented research
  • Experience with working in Agile Methodology
  • Experience in the development of security products
  • Experience in the following attack areas:
  • ARM/PPC reversing
  • EPP evasion and handling
  • Kernel debugging
  • Hands-on experience with the Java development language
  • Bachelor’s degree in Computer Science or a related field


We are an equal opportunity employer and we are committed to building a diverse and talented workforce. We do not discriminate on the basis of race, sex, religion, colour, national origin, gender, gender identity, sexual orientation, age, marital status, veteran status, medical condition, disability, or any other class or characteristic protected by applicable law. We welcome candidates from all backgrounds to join us!

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  10  0  0
Category: Research Jobs

Tags: Agile APIs Automation Bash Blue team C Computer Science EDR Java Offensive security PowerShell Python R&D Vulnerabilities WinDbg Windows

Perks/benefits: Career development

Region: Middle East
Country: Israel

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.