Reverse Engineer for Check Point Software Technologies (Dnipro)

Dnipro, Ukraine

Apply

The globally acclaimed Mobile Threat Detection group is on the frontline of defense against the most perilous cyber-attacks and most insidious hackers. Join us and work shoulder to shoulder with the best-in-the-field researchers, developers, reverse engineers and data scientists. We are proud to share our knowledge, presenting our work at the leading security conferences worldwide including multiple appearance at DEF CON and Black Hat. Here are some examples of our talks and findings:

* DEF CON 2018, Man In The Disk,

https://www.defcon.org/html/defcon-26/dc-26-speakers.html#Makkaveev

* DEF CON 2017, Packers,

https://www.youtube.com/watch?v=U1XeGYDFp9A

* Black Hat 2015, Certifi-gate,

https://www.blackhat.com/us-15/briefings.html#certifi-gate-front-door-access-to-pwning-millions-of-androids

* Virus Bulletin,

https://www.virusbulletin.com/conference/vb2018/abstracts/android-app-deobfuscation-using-static-dynamic-cooperation

* Data Science Summit,

https://events.bizzabo.com/DataScienceSummit2018/agenda/session/251388

* Gooligan,

http://blog.checkpoint.com/2016/11/30/1-million-google-accounts-breached-gooligan/

* Expensive Wall,

https://blog.checkpoint.com/2017/09/14/expensivewall-dangerous-packed-malware-google-play-will-hit-wallet/

Check Point Mobile Security product protects the world’s leading organizations from advanced mobile threats. Check Point Mobile Security product empowers the new mobile enterprise to embrace all types of mobile devices and applications while protecting their resources from cyber-espionage and cyber-crime. By utilizing an on device and network based defense-in-depth strategy, our SandBlast Mobile solution uniquely assesses mobile risks and enables enterprises to detect and eliminate all types of emerging, targeted and zero-day mobile attacks.

Read more about the client

Description

On behalf of Check Point Software Technologies, Ciklum is looking for Reverse Engineer to join Dnipro team on full-time basis.

As part of the group, you will get extensive research and development experience and a deep understanding of the mobile threat-scape to the role.

Responsibilities

In the role of Reverse Engineer you will make researches and investigations in collaboration with other reverse engineers, security researchers, analysts and data scientists.

Requirements

• Previous proven experience in Reverse Engineering (RE) and security research;
• Experience with IDA Pro, JEB or equivalent disassembly tools;
• Experience in writing code in JAVA, Python;
• Good skills in English, both verbally and in writing;
• Team player who see the value of good communication with teammates ;
• A university or Master degree in Computer Engineering or equivalent.

Desirable

• Deep knowledge in operating systems internals (Android, Linux);
• Experience in working in agile environment.

What's in it for you

• Unique working environment where you communicate and work directly with client;
• Variety of knowledge sharing, training and self-development opportunities;
• Competitive salary;
• State of the art, cool, centrally located office with warm atmosphere which creates really good working conditions.