April 12, 2019

Key Responsibilities:

  • Search for new vulnerabilities in files
  • Find threats in our product to prevents and explain the attack impact
  • Be an integral part of the development cycle, providing the security point of view
  • Generate sample files which will be used internally and with prospects
  • Write technology blogs about vulnerabilities found
  • Analyze malicious attacks that were blocked by our system and provide an impact assessment of the attack.
  • Competitive analysis (technical)



  • At least 2 years of experience in technological research
  • Wide knowledge in information security
  • Vulnerability research experience
  • Malware analysis capabilities
  • Deep understanding of file formats
  • Experience in Python or another scripting language
  • Ability to plan, develop and deliver POC over multiple developing languages and environments
  • Sandboxing and hypervisor setups: Cuckoo/Xen/VirtualBox/VMWare/Others – An advantage
  • Experience with intelligence analysis processes, including Open Source Intelligence (OSINT) and closed source intelligence gathering, source verification, data fusion, link analysis and threat actor – An advantage
  • The ability to quickly dive into new unfamiliar challenges
  • Excellent spoken and written English – must
  • Bachelor’s degree in Computer Science or equivalent education – An advantage

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it. Privacy policy