Security Researcher

Remote: 
Full Remote
Contract: 
Work from: 

Offer summary

Qualifications:

Reverse engineering skills with deep knowledge of assembler (x86)., Experience in debugging and disassembling using tools like WinDbg and IDA Pro., Strong understanding of networking protocols and cryptography principles., Development skills in Python and C/C++ with good English proficiency..

Key responsibilities:

  • Reverse engineer malware and write detailed reports on findings.
  • Develop tools for automatic research in the lab.
  • Propose improvements to existing Check Point products based on research.
  • Investigate advanced persistent threats and understand the malicious underground market.

Check Point Software Technologies Ltd logo
Check Point Software Technologies Ltd
5001 - 10000 Employees
See all jobs

Job description

Why Join Us?

Check Point’s mission is to provide industry-leading security solutions that redefine the security landscape. We achieve our mission by constantly developing innovative and cutting edge technology solutions focused on real customer needs while challenging ourselves to grow and excel.

If you want to be part of the fascinating and fast-growing Cyber Security industry, where your unique talent and value will be recognized, Check Point Software Technologies is where you want to be.

Check Point Research is expanding and establishing a new international force of talented Researcher. We are looking for an experienced Reverse Engineer to investigate top-tier intrusions and nation-state attacks. Check Point research, or simply CP, is Check Point Software Technologies’ cyber security research unit. Analyzing the threat landscape and responding to new threats are our responsibilities. The work of our researchers is constantly presented at international conferences and covered by major media outlets globally. Threat research is an exciting area for us, and we give the CP members the freedom and means to practice it.

Why It May Be Interesting To You

  • Research the most interesting malware samples in the world, including Advanced Persistent Threats
  • Learn how malicious Underground Market operates: from exploitation to worldwide infections
  • Develop your investigation skills
  • Have an opportunity to interact with the most renowned people in the cyber security industry
  • Opportunity to present your work at the top conferences

Terms And Bonuses

  • Work in a large international IT company, full-time (flexible)
  • Business trips (basically to Israel)

Key Responsibilities

  • Reverse engineer malware, exploits, shellcodes and write meaningful reports
  • Develop tools for automatic research lab
  • Propose improvements to existing Check Point products, based on gathered knowledge
  • Research the most interesting attacks in the world, including Advanced Persistent Threats
  • Learn how malicious Underground Market operates: from exploitation to worldwide infections
  • Develop your investigation skills
  • Have an opportunity to interact with the most renowned people in cyber security industry

Qualifications

Requirements:

  • Reverse engineering skills
  • Deep assembler (mostly x86) knowledge
  • Experience in debugging (X86/64, WinDbg) and disassembling (IDA Pro)
  • Network (deep TCP/IP understanding, usage of Wireshark)
  • Knowledge of how cryptography works: PKI, SSL, RSA, RC4, Blowfish, SHA, MD5, etc.
  • Operating systems – Windows: Native, Win32 APIs, kernel and drivers - how stuff works.
  • Experience with *nix systems
  • Development skills (Python, C/C++)
  • Good English knowledge

Advantages

  • Forensics skills, cloud-focused skills
  • Malware - detection, analysis, removal, evasions, deobfuscation, etc.
  • Classic security knowledge: how attacks are performed, DDoS, exploits, buffer overflows, shellcodes, ROP, etc.
  • “Out of the box” thinking
  • Ability to learn new stuff quickly.

Required profile

Experience

Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Quick Learning
  • Analytical Skills

Security Analyst Related jobs