Security Researcher

Herzliya, Tel Aviv District, IL

Cognyte

Cognyte is a global leader in security analytics software that empowers governments and enterprises with Actionable Intelligence for a Safer World™.

View all jobs at Cognyte

Apply now Apply later

Description

Today’s world is crime-riddled. Criminals are everywhere, invisible, virtual, and sophisticated. Traditional ways to prevent and investigate crime and terror are no longer enough… 

Technology is changing incredibly fast. The criminals know it, and they are taking advantage. We know it too.  

For nearly 30 years, the incredible minds at Cognyte around the world have worked closely together and put their expertise to work, to keep up with constantly evolving technological and criminal trends and help make the world a safer place with leading investigative analytics software solutions. 

We are defined by our dedication to doing good and this translates to business success, meaningful work friendships, a can-do attitude, and deep curiosity.

As a Communication Protocols Security Researcher at Cognyte, your day will be filled with stimulating tasks. You’ll start by catching up on the latest in communication protocols. Then, you’ll dive into identifying vulnerabilities and developing strategies to exploit them. You’ll also spend time brainstorming with your team to come up with innovative solutions to complex security problems.


As a Cognyter you will:

  • Protocol Analysis: Conduct in-depth research and analysis of various communication protocols to understand their design, implementation, and potential vulnerabilities.
  • Reverse Engineering and Vulnerability Research: Apply reverse engineering techniques to deconstruct systems and understand their inner workings and Conduct research to discover new vulnerabilities in various systems and technologies.
  • Solution Implementation: Translate your research findings into practical solutions and implement them in our products.
  • Product Development: Contribute to the advancement of Cognyte’s products by staying abreast of the latest developments in the field and innovating new features and improvements.
  • Communication Protocols and Wireless Attacks: work with a variety of communication protocols such as WPA2, WAP3, BLE, BT classic, NFC, RFID, satellite protocols, and more.

Requirements

For that mission you’ll need:

  • Minimum of 4 years of experience as a Security Researcher.
  • Proficiency in Python and C/C++ is required. Knowledge of Java is an advantage.
  • Familiarity with Linux is required.
  • Experience with Assembly, ARM, and x86. Familiarity with rare/unique DSPs - an advantage.
  • Experience with Android/iOS is an advantage.
  • Familiarity with Wifi and Bluetooth protocols is an advantage.
  • Experience with IDA/Ghidra is an advantage.
  • Experience in reversing of applications is an advantage.

Remember: When you're curious enough, you don't need to check every box to apply. Be in touch!

We believe that diverse teams drive the greatness of ideas, products, and companies. Whatever your gender, age, race, creed, or taste in music – if you're curious enough, you don't need to check every box to apply. We’re waiting for you. Apply now.

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0
Category: Research Jobs

Tags: Analytics Android C Exploit Ghidra iOS Java Linux Python Reverse engineering Vulnerabilities

Region: Middle East
Country: Israel

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.