April 12, 2019

Key Responsibilities:

  • Search for new vulnerabilities in files
  • Find threats our product prevents and explain the attack impact
  • Be an integral part of the development cycle, providing the security point of view
  • Generate sample files which will be used internally and with prospects
  • Write technology blogs about vulnerabilities found
  • Analyze malicious attacks that were blocked by our system and provide an impact assessment of the attack.
  • Competitive analysis (technical)


  • At least 2 years of experience in technological researchWide knowledge in information security
  • Vulnerability research experience
  • Malware analysis capabilities
  • Deep understanding of file formats
  • Experience in Python or another scripting language
  •  Ability to plan, develop and deliver POC over multiple developing languages and environments
  • Sandboxing and hypervisor setups: Cuckoo/Xen/VirtualBox/VMWare/Others – An advantage
  • Experience with intelligence analysis processes, including Open Source Intelligence (OSINT) and closed source intelligence gathering, source verification, data fusion, link analysis and threat actor – An advantage
  • The ability to quickly dive into new unfamiliar challenges
  • Excellent spoken and written English – must
  • Bachelor’s degree in Computer Science or equivalent education – An advantage

Pick What Works for You

Get a Free Trial
Try our protection services
for 30 days. No commitment.

Schedule a Demo
Let us know when and we’ll
set up the full experience
Schedule a Demo

Let’s Talk!
We would love to
hear from you

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it. Privacy policy

Let’s Start

Secure Your Digital Journey