Description
📍 Locations (Hybrid): Tel Aviv, Israel
🌟 Opportunity Highlights
SafeBreach is looking for a Security Researcher to join our world-class original research team!
If you are interested in conducting innovative vulnerability/security research while becoming a worldwide known researcher, then this is your opportunity.
As a researcher in SafeBreach, you’ll be joining a top-notch security research team that produces some of the world’s most novel research projects. You’ll be provided with guidance for finding creative research targets and performing groundbreaking research, in order to get accepted to present your findings in the world’s top conferences such as Black Hat, DEF CON and more! The team’s primary expertise lies in vulnerability research in Windows and endpoint security controls, though research is made in a variety of other scopes as well such as Android, applications, embedded devices, AI, and more!
SafeBreach Labs is an expert in producing such groundbreaking research projects. SafeBreach Labs has not missed a year of presenting novel research at Black Hat USA and DEF CON since 2019, not including many more appearances in conferences around the globe. You will thrive in this role if you aim high!
👋 Who We Are
Combining the Mindset of a CISO and the Toolset of a Hacker, SafeBreach pioneered breach and attack simulation (BAS) and is the most widely used continuous security validation platform. Our platform continuously executes attacks, correlates results to help visualize security gaps, and leverages contextual insights to highlight remediation efforts.
The best thing about SafeBreach? Definitely The People – SafeBreachers are friendly and collaborative, they work hard and dream big. We've built together an amazing culture and we are looking to add more awesome people to our growing team!
🎯 In this position you will:
- Get to choose your own unique research targets
- Research a variety of attack surfaces on various products and operating systems
- Submit vulnerability reports
- Create presentations and blog posts that describe your research
- Submit and present your research projects’ presentation in the world’s top conferences
Requirements
🫵 Who YOU Are
To succeed in this role you need to have:
- At least 5 years of experience in offensive approach
- At least 3 years of experience in reverse engineering
- Knowledge of networking and internet protocols
- Knowledge of Windows/Linux internals
- Offensive tools development experience - Advantage
- Ability and desire to work in a high paced startup environment
- Ability to handle new technological concepts
- Self drive and autonomous learning abilities
- Past security/malware/vulnerability research experience - advantage
- Public speaking skills - Advantage
⏳ Interview Process
Average Duration: 21-28 days
Key steps:
- Send your application
- Receive a response from us within 5-7 days
(If selected)
- Meet the Recruiter (15 minutes)
- Meet the Hiring Manager (60 minutes)
- Technical Assignment
- Technical Interview (60 minutes)
- Meet the team On-Site
- Final steps