Cyber Researcher
Posted 2025-08-23
Remote, USA
Full Time
Immediate Start
<b>Description</b><br><p><strong>Accelerate Your Career in Cybersecurity </strong></p><p>Join Pentera and take your career to the next level in cybersecurity. As a leader in Automated Security Validation, we help businesses around the world safely emulate real‑world attacks to uncover their vulnerabilities, just like the world’s best red teams. At Pentera, you’ll be at the forefront of cybersecurity innovation, working on advanced tools that challenge organizations' defenses and push the limits of security testing. With over 350 team members and 1,000+ customers in more than 50 countries, Pentera is a growing company supported by top investors like Insight Partners, K1, and The Blackstone Group. If you're looking to grow your skills, make a difference, and be part of an innovative team, Pentera is the place for you. </p><p><strong>About the Role:</strong></p><p>We are looking for a versatile and innovative Attack-oriented Cyber Researcher to join our R&D team and become part of the revolution. You will conduct state-of-the-art research across multiple environments, ranging from Windows internals and kernel-level security to cloud platforms like AWS, Azure, Web technologies, etc' to stay one step ahead of real threat actors.</p><p>Your findings, your code and attack tools will feed directly into our automated attack platform, enhancing its capabilities with new offensive techniques and AI-powered decision-making algorithms.</p><p><br></p><p><strong>Roles and Responsibilities:</strong></p><ul><li>Perform in-depth research in multiple areas such from AV/EDR evasion, binary exploitation, vulnerability discovery, and subversion of communication channels across both OS-level, domains, cloud-native domains, external surfaces. </li><li>Integrate research outputs into production-grade attack functionalities within our automation ecosystem. </li><li>Architect and develop AI-driven decision-making modules that enable the platform to mimic experienced attackers, making real-time choices during automated operations. (New AI-focused responsibility.)</li><li>Develop production-ready attack capabilities using whatever technologies are necessary, Python, C/C++, C#, Java, Office Macros, Bash, PowerShell, Go, Ruby, Assembly, etc. </li><li>Mentor and collaborate with fellow R&D team members, fostering a culture of innovation and continuous learning. </li></ul><p><br></p><br> <b>Requirements</b><br><ul><li>5+ years of experience in Windows internals, low and high-level attack-oriented development, penetration testing, and offensive security. </li><li>3+ years of experience in Python development. </li><li>Demonstrated skill in writing cyber-related code optimized for performance, memory, and stealth. </li><li>Experience with attack frameworks and tools such as Metasploit, Nmap, Cobalt Strike, Impacket, Burp, Pacu, and similar. </li><li>Proficiency in reverse engineering and debugging (e.g., IDA, Radare2, WinDBG) for low-level research. </li><li>Familiarity with cloud ecosystems and hybrid environments, specifically AWS, Azure. </li><li>Ability to apply AI or machine learning concepts and models to decision-making processes within the automated attack platform.</li><li>Excellent teamwork, adaptability, and a quick learning mindset. </li></ul><p><strong>Preferred skills:</strong></p><ul><li>IDF cyber team veteran. </li><li>Passion for cyber research and hands-on experience with red/blue team operations. </li><li>Experience in Agile methodology and security product development. </li><li>Bachelor’s degree in Computer Science or related field.</li></ul><p><br></p><p>We are an equal opportunity employer and we are committed to building a diverse and talented workforce. We do not discriminate on the basis of race, sex, religion, colour, national origin, gender, gender identity, sexual orientation, age, marital status, veteran status, medical condition, disability, or any other class or characteristic protected by applicable law. We welcome candidates from all backgrounds to join us! </p><p><br></p><p><br></p><br>