You will:
Research and monitor new vulnerabilities, attacks, and exploits on infrastructure components and / or software
Perform analysis on the exposure of our current infrastructure and components against newest vulnerabilities and threats on the infrastructure and/ or application layer
Write up advisories based on analysis of vulnerabilities
Collaborate in Writing up papers / analysis on technologies and solutions deployed at Dell as relates to current exposure on known vulnerabilities and provide recommendations for remediation activities and applicable controls required
Engagement with the other teams like: - Threat Intel/IR/Red Team to provide inputs/IOC’s/specific monitoring etc. to secure the impacted assets and components until the remediation.
Research and assess existing exploit code for new and critical vulnerabilities and/or develop proof-of-concept exploit code for test and evaluation of mitigations solutions.
Collaborate with peer researchers in the research of software / system vulnerabilities, poking around the internals of various operation systems or infrastructure components to discover new features, vulnerabilities, and techniques of exploitation
Collaborate with other researchers in testing out ideas and automating code for new and critical vulnerabilities using a solid, virtual lab.
Reverse engineer intricate systems and protocols vulnerabilities
Improve upon proof-of-concept code to demonstrate vulnerabilities
Cultivate the practice of staying abreast on latest trends and developments in vulnerability research, tools and solutions, threat intelligence and remediation activities followed across industry.
Development experience in a high-level language (C/C++, Python)
Advance knowledge in threat and vulnerability management, /or penetration testing
Experience developing custom software tools to assist in performing reverse engineering and vulnerability analysis
Excellent problem-solving skills with the ability to diagnose and troubleshoot technical issues.
Excellent verbal, written communication and presentation skills to present complex security issues and vulnerability analysis
Collaborative / team player, self-driven, independent, and customer-oriented
Candidates must be able to work independently and demonstrate exceptional organizational and time management skills
OSCP or similar certification advantageous.
Desirable Requirements
A degree in Information Technology, Information Security or related major and 4-6 years of direct experience in the field of cybersecurity.
Familiarity with operating system internals and exploit mitigation techniques
Good technical aptitude, problem solving and ability to quickly learn and master new topics and domains.
משרות נוספות שיכולות לעניין אותך