Назад
Company hidden
1 день назад

Senior Product Security Low-Level Researcher (Cybersecurity)

Формат работы
onsite
Тип работы
fulltime
Грейд
senior
Английский
b2
Страна
Israel
Вакансия из списка Hirify.GlobalВакансия из Hirify Global, списка международных tech-компаний
Для мэтча и отклика нужен Plus

Мэтч & Сопровод

Для мэтча с этой вакансией нужен Plus

Описание вакансии

Текст:
/

TL;DR

Senior Product Security Low-Level Researcher (Cybersecurity): Researching and discovering vulnerabilities across operating system kernels, drivers, and system components to enhance the security of the Enterprise Browser with an accent on OS internals, exploit development, and low-level instrumentation. Focus on identifying design flaws in memory management and scheduling, building custom fuzzing tools, and breaking isolation mechanisms.

Location: Tel Aviv

Company

hirify.global provides an Enterprise Browser that embeds core organizational needs into the browser itself for complete control, visibility, and governance.

What you will do

  • Research and discover vulnerabilities in OS kernels, drivers, system services, and virtualization layers.
  • Analyze kernel subsystems (memory management, scheduling, IPC) to identify design flaws and logic bugs.
  • Develop proof-of-concept exploits for kernel- and driver-level issues to validate impact and inform mitigations.
  • Design and build custom tooling for kernel fuzzing, syscall testing, and low-level instrumentation.
  • Assess cryptographic primitives, secure boot, attestation, and hardware-backed security features.
  • Collaborate with architects and platform engineers to model threats across privilege boundaries and boot chains.

Requirements

  • Strong understanding of operating system internals, kernel architectures, or driver development (Linux, Windows, macOS, or mobile).
  • Hands-on experience with C/C++, Rust, or assembly, and Python for automation.
  • Background in kernel vulnerability research, driver auditing, exploit development, or advanced reverse engineering.
  • Deep familiarity with low-level vulnerability classes such as UAF, race conditions, and privilege escalation.
  • Experience with kernel debuggers, fuzzers, emulation, or virtualization-based analysis frameworks.
  • Strong curiosity and a research mindset focused on breaking low-level system assumptions.

Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →