Expoint - all jobs in one place
מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר
Limitless High-tech career opportunities - Expoint

Cyberark Senior Penetration Testing Researcher 
Israel 
750010478

Today
Job Description

As a Senior PT Researcher in CyberArk Labs, you will be the go-to-guy to find traditional and creative ways to break all kinds of products.

  • Be part of CyberArk Labs, and elite unit of security researchers.
  • Perform advanced and top-class penetration testing research projects on CYBR products.
  • Make sure CYBR products are in a secure state by leading vulnerability research projects focused internally on the company products.
  • Present findings and work closely with software architects and development teams to ensure products are developed according to the best security standards.
  • Be a security research expert and stay up to date with new vulnerability research techniques that are being developed and published worldwide.
  • Through the year, include research work, and aim to discover innovative and creative security findings in CYBR products.

What you need to succeed:

  • At least 5 years of experience in hands-on security research
  • Hands-on experience in penetration testing cloud, web, and mobile applications.
  • Experience with code security review - the ability to read code and identify security issues.
  • Experience with open source and commercial PT tools for scanning and detecting weaknesses.
  • Deep understanding of security principles and demonstrated experience in writing relevant scripts and code.
  • Ability to work in a dynamic, fast-moving, and growing environment.
  • Good self-learner and out-of-the-box thinker.
  • Fluent in English and Hebrew.

How will you stand out from the crowd:

  • Offensive Security Certifications such as OSCP, AWAE, OSCE.
  • Bachelor's degree in computer science or related field.
  • IDF service in an elite technology unit.
  • Examples of thought leadership activities in the security space (e.g. blog posts or conference talks).
  • Demonstrated security research activities (e.g. participation in bug bounties or getting credit for reporting CVEs).