Job Description
A dedication to continuous learning and skill development to meet evolving job demands.
Minimum 4 years of experience in both static and dynamic malware analysis for x86/x64 or ARM architecture. Proficiency with reverse engineering and analysis tools, such as disassemblers, compilers, and debuggers (like IDA, Ghidra, Win DBG, Sys Internals, LLDB, GDB ). Strong background in malware analysis and understanding its behavior consisting of advanced malware techniques, including but not limited to anti -tampering, defense evasion, lateral movement, ransomware, persistence, information leak.
Understanding of OS internals of at least one of Windows/Linux.
Programming experience : Assembly, C/C++ , Python. Advantages
Proficient with creating detection rules using YARA or similar engines for production use Understanding of existing AV/EDR internals and detection mechanisms
Automation skills for handling malware detection based workflows is a plus but not mandatory.
Minimum 4 years of experience in both static and dynamic malware analysis for x86/x64 or ARM architecture. Proficiency with reverse engineering and analysis tools, such as disassemblers, compilers, and debuggers (like IDA, Ghidra, Win DBG, Sys Internals, LLDB, GDB ). Strong background in malware analysis and understanding its behavior consisting of advanced malware techniques, including but not limited to anti -tampering, defense evasion, lateral movement, ransomware, persistence, information leak.
Understanding of OS internals of at least one of Windows/Linux.
Programming experience : Assembly, C/C++ , Python. Advantages
Proficient with creating detection rules using YARA or similar engines for production use Understanding of existing AV/EDR internals and detection mechanisms
Automation skills for handling malware detection based workflows is a plus but not mandatory.
Apply for this Position
Ready to join SentinelOne? Click the button below to submit your application.
Submit Application