Expoint - all jobs in one place

Finding the best job has never been easier

Limitless High-tech career opportunities - Expoint

Palo Alto Senior Security Researcher - Linux MacOS EDR Cortex 
Israel, Tel Aviv District, Tel Aviv-Yafo 
41151993

24.06.2024
Description

Being the cybersecurity partner of choice, protecting our digital way of life.

Your Career

You will create statistics-based classification algorithms detecting everything from new malware through process behavior and attackers operating in enterprise-scale networks using data from multiple endpoints of various operating systems; from analyzing attack patterns, finding statistical anomalies, and validating that you detect real attacks and APTs on real customer data.

Your Impact

  • Research new methods to detect targeted attackers by utilizing enormous amounts and varied types of data
  • Simulate attacks in the lab and conduct a deep analysis of the behavior
  • Use and develop statistical algorithms and techniques to create and improve our analytics detection capabilities
  • Be part of a diverse research group, improving our research processes and leading us to be a better team creating a better product
  • Stay up to date with APTs, attacker methodologies, and TTPs

Your Experience

  • 7 years of industry experience (including army service experience)
  • At least 2 years of experience with endpoint security research
  • In-depth knowledge of the inner-workings of operating systems (Windows/Linux/MacOS)
  • Intimate knowledge and understanding of attack methods and techniques over endpoints and enterprise
  • Vast experience and interest in Malware research or development
  • Python software development experience
  • Comfortable conducting research and gathering insights by querying large databases
  • Ability to initiate , drive and own projects
  • Independent and team player, critical thinker

Nice to have

  • Experience in ML or data analysis
  • Experience with Reverse Engineering
  • Experience in Graph Databases
  • Advanced knowledge in Microsoft AD infrastructure
  • Exploitation knowledge and experience

We define the industry instead of waiting for directions. We need individuals who feel comfortable in ambiguity, excited by the prospect of a challenge, and empowered by the unknown risks facing our everyday lives that are only enabled by a secure digital environment.

All your information will be kept confidential according to EEO guidelines.