Malware Researcher - CTI (Cybersecurity)
Мэтч & Сопровод
Для мэтча с этой вакансией нужен Plus
Описание вакансии
TL;DR
Malware Researcher (CTI): Analyze and reverse engineer malware and tooling used by advanced threat actors targeting governments and critical infrastructure with an accent on binary/script analysis, configuration extraction, and C2 infrastructure mapping. Focus on developing detection artifacts like YARA rules and CAPA signatures, and collaborating with CyberAI researchers on AI-driven analysis tools.
Location: Tel Aviv
Company
combines AI and human expertise to protect nations and critical infrastructure with proprietary Cyber Language Models providing contextual intelligence.
What you will do
- Perform static and dynamic analysis of malware, implants, loaders, and tooling used by APTs.
- Reverse engineer binaries (PE, ELF, .NET) and scripts (PowerShell, JavaScript/VBA) to uncover capabilities, execution flow, persistence, and evasion techniques.
- Extract and document configurations, C2 data, and map to threat actors and campaigns with CTI researchers.
- Develop detection artifacts including YARA rules, VT LiveHunt queries, CAPA rules, and sandbox signatures.
- Collaborate with CyberAI researchers to advance AI-driven cyber analysis capabilities.
Requirements
- 4+ years in cybersecurity with hands-on malware research on APTs and state-linked actors.
- Proficiency with RE tools: IDA Pro, Ghidra, x64dbg/WinDbg, dynamic analysis sandboxes.
- Deep knowledge of OS internals (Windows/Linux/Android/Mac), persistence techniques, and offensive tradecraft.
- Experience extracting configs, C2 endpoints, and capabilities from compiled/scripted malware.
- Strong investigative mindset and ability to handle obfuscated data.
- Experience with government or critical infrastructure (advantage).
Culture & Benefits
- Work with a passionate team of innovative minds tackling real-world cyber challenges.
- Opportunity to redefine AI and security in a high-impact environment.
- Build next-generation products for the future of cybersecurity.
Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →