_DO NOT CLICK_
Expoint - all jobs in one place

Finding the best job has never been easier

Decoding Researcher High Tech Jobs

48 found
JF
JFrog

Security Researcher

Security Researcher

Israel, Netanya

28.11.2021
I
Intel

Security researcher

Security researcher

Israel, Jerusalem

28.11.2021
I
Intel

Security Researcher

Security Researcher

Israel, Petah Tikva

28.11.2021
C
Cyberark

Cyber Researcher

Cyber Researcher

Israel, Petah Tikva

26.11.2021
F5
F5

Security Researcher

Security Researcher

Israel, Tel Aviv

27.11.2021
C
Cellebrite

Junior Researcher

Junior Researcher

Israel

26.11.2021
F
Forter

Core Researcher

Core Researcher

Israel, Tel Aviv

Yesterday
S
Salt

Security Researcher

Security Researcher

Israel, Tel Aviv

28.11.2021
C
Cyberark

Malware Researcher

Malware Researcher

Israel, Petah Tikva

26.11.2021
T
Trigo

Algorithms Researcher

Algorithms Researcher

Israel

Yesterday
1
2
3
4
5
JFrog

Security Researcher

Israel, Netanya
Details
As a Security Researcher in JFrog you will...
  • Research binary images, which can range from low-level embedded firmwares to modern container images. Analyze the security posture of these images from all aspects (configuration, public vulnerabilities and zero-day vulnerabilities)
  • Research for common pitfalls in 3rd-party software (high and low-level technologies)
  • Define how to automatically find vulnerabilities and security issues, develop code and implement proof-of-concepts of automated vulnerability detection
  • Create security/ threat analysis reports and other relevant customer and public-facing documentation on researched images
  • Deliver concise technical research and insights to customers and other teams in order to improve JFrog's products and capabilities
  • Implement proof-of-concepts for attacks on researched images
To be a Security Researcher in JFrog you need...
  • 2+ years of experience with binary code analysis and reverse engineering
  • 2+ years of programming experience in all of the following: C, Python
  • Experience with Cloud Native and DevOps technologies - An advantage
  • Experience with software exploitation and penetration testing - An advantage
  • Experience with automation of binary analysis (ex. IDAPython) - An advantage
Banner