Reverse engineering skills with deep knowledge of assembler (x86)., Experience in debugging and disassembling using tools like WinDbg and IDA Pro., Strong understanding of networking protocols and cryptography principles., Development skills in Python and C/C++ with good English proficiency..
Key responsibilities:
Reverse engineer malware and write detailed reports on findings.
Develop tools for automatic research in the lab.
Propose improvements to existing Check Point products based on research.
Investigate advanced persistent threats and understand the malicious underground market.
Report This Job
Help us maintain the quality of our job listings. If you find any issues with this job post, please let us know.
Select the reason you're reporting this job:
Check Point Software Technologies Ltd
5001 - 10000
Employees
About Check Point Software Technologies Ltd
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Check Point’s solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and advanced targeted threats. Check Point offers a multilevel security architecture, “Infinity Total Protection with Gen V advanced threat prevention”, this combined product architecture defends an enterprises’ cloud, network and mobile devices. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.
Check Point’s mission is to provide industry-leading security solutions that redefine the security landscape. We achieve our mission by constantly developing innovative and cutting edge technology solutions focused on real customer needs while challenging ourselves to grow and excel.
If you want to be part of the fascinating and fast-growing Cyber Security industry, where your unique talent and value will be recognized, Check Point Software Technologies is where you want to be.
Check Point Research is expanding and establishing a new international force of talented Researcher. We are looking for an experienced Reverse Engineer to investigate top-tier intrusions and nation-state attacks. Check Point research, or simply CP, is Check Point Software Technologies’ cyber security research unit. Analyzing the threat landscape and responding to new threats are our responsibilities. The work of our researchers is constantly presented at international conferences and covered by major media outlets globally. Threat research is an exciting area for us, and we give the CP members the freedom and means to practice it.
Why It May Be Interesting To You
Research the most interesting malware samples in the world, including Advanced Persistent Threats
Learn how malicious Underground Market operates: from exploitation to worldwide infections
Develop your investigation skills
Have an opportunity to interact with the most renowned people in the cyber security industry
Opportunity to present your work at the top conferences
Terms And Bonuses
Work in a large international IT company, full-time (flexible)
Business trips (basically to Israel)
Key Responsibilities
Reverse engineer malware, exploits, shellcodes and write meaningful reports
Develop tools for automatic research lab
Propose improvements to existing Check Point products, based on gathered knowledge
Research the most interesting attacks in the world, including Advanced Persistent Threats
Learn how malicious Underground Market operates: from exploitation to worldwide infections
Develop your investigation skills
Have an opportunity to interact with the most renowned people in cyber security industry
Qualifications
Requirements:
Reverse engineering skills
Deep assembler (mostly x86) knowledge
Experience in debugging (X86/64, WinDbg) and disassembling (IDA Pro)
Network (deep TCP/IP understanding, usage of Wireshark)
Knowledge of how cryptography works: PKI, SSL, RSA, RC4, Blowfish, SHA, MD5, etc.
Operating systems – Windows: Native, Win32 APIs, kernel and drivers - how stuff works.
Experience with *nix systems
Development skills (Python, C/C++)
Good English knowledge
Advantages
Forensics skills, cloud-focused skills
Malware - detection, analysis, removal, evasions, deobfuscation, etc.
Classic security knowledge: how attacks are performed, DDoS, exploits, buffer overflows, shellcodes, ROP, etc.
“Out of the box” thinking
Ability to learn new stuff quickly.
Required profile
Experience
Spoken language(s):
English
Check out the description to know which languages are mandatory.