About Us: A top-tier cyber technology and services company, providing consulting and incident response support for organizations worldwide. The company works with organizations to proactively build their cyber resilience and respond to attacks within their networks. It is the trusted advisor and cyber security service provider of IT and security teams, senior managements, and boards of top organizations worldwide, including Fortune 100 companies. The company draws on top talent from elite military technology units and the cyber industry to excel in the age of cyber.Role and Responsibilities:
Perform static and dynamic analysis, including reverse engineering, of malware to fully understand functionality, extract indicators, and support ongoing incident response investigations.
Support threat research of attack formations, attackers' infrastructures, and APT groups.
Conduct in-depth research of operating system internals, develop proof of concept code, adapt and develop tools and infrastructure, generate comprehensive reports.
Support incident response efforts, participate in thought leadership efforts, provide training, and mentorship as needed.
Requirements:
At least 5 years of relevant experience (from military service and/or industry).
Bright, problem solver, independent, initiative and self-motivated.
Extensive hands-on experience with analyzing and reverse engineering malware samples written in multiple programming and scripting languages (C/C++, Go, .NET, Obfuscated Python, VB, PowerShell, and web scripts).
Extensive hands-on experience working with static and dynamic binary analysis tools, including IDA Pro disassembler and user and kernel space debuggers (e.g., GDB, WinDBG, OllyDbg).
Experience with analyzing shellcode, packed and obfuscated code.
Ability to read or write in x86/x64 assembly language.
Solid understanding of OS internals of at least two operating systems (Windows, Linux / Unix, and MacOS).
Deep technical understanding of network fundamentals and common internet protocols, and ability to analyze packet captures.
Strong programming and scripting skills.
Knowledge of cryptographic algorithms and protocols – advantage.
Experience with vulnerability research – advantage.
Excellent communication and interpersonal skills. Fluent English, including the ability to document and explain technical information in a concise, understandable manner.
The position is open to women and men alike.🌸להגשת מועמדות יש לשלוח קורות חיים עם מספר המשרה למייל🌸 cvs@next-point.co.il 💫next-point. You name it We'll find it!💫