BSc+ in Computer Science\Computer Engineering or equivalent engineering degrees
4+ years of software development/research experience
In-depth knowledge and experience with the security threat landscape, background in the modern attacker kill-chain and MITRE ATT&CK, preferably in endpoint/network -based threat scenarios.
Full stack research capabilities - from technique PoC to detection engineering and implementation within all required organizational process.
A drive to tackle hard problems with level of ambiguity.
Extensive, practical OS internals knowledge of Windows
Knowledge of standard IT network protocols, detection of network attacking phases(Recon\Exploitation\Lateral Movement\Exfiltration).
Low level development experience - preferably at windows environment at User&Kernel modes, at C\C++. • Excellent cross-group and interpersonal skills
Code fluency in either C#, C, Python or Rust
Responsibilities
Conduct in-depth research for detection mechanisms to detect novel and front line offensive tradecraft – from exploits to implants and End-to-end implementation from offensive PoC to wide-scale deployable detection PoC, necessary development on agent and cloud platforms.
Keep up to date with latest trends in cyber-attacks and create robust, sophisticated detection logics across the entire kill-chain.
Investigate, analyse, and expand MDE security, by exploring real incidents, developing durable protection strategies, and circumventing threats across the entire kill-chain
Collaborate with multiple product teams to design sensors, implement protection ideas, and validate their effectiveness using a data-driven approach
Collaborate with data science teams to drive ML based protections, understand, and identify detection gaps, capabilities, assumptions, and improvements
Be involved in customer conversations to identify opportunities, gaps, and concerns to improve product protection value