Head of Research

Petah Tikva, IL · Cyber Security Services

We are looking for a talented and self driven Security Researcher to lead our global Security Research Team.

The Head of Research position includes comprehensive HO work in fields such as Malware Research, Reverse Engineering, investigating and responding to threats targeted against Cyberint’s Customers. The team is responsible for the comprehensive cyber defense of Cyberint’s customers and is part of Cyberint Managed Global services.


  • Lead and manage various Technical project with Cyberint’s customers
  • Provide cogent cyber threat intelligence analysis to enterprise clients and various internal teams 
  • Create custom analytic products based on conclusions and judgments derived from large quantities of Cyberint’s Intelligence data sources and independent research
  • Provide timely support for clients’ incident response, hunting, threat intelligence teams by collecting relevant intelligence and/or performing unique research and providing analysis
  • Perform technical analysis on malicious or suspicious artifacts (malicious executables and documents, packet captures, etc)
  • Work closely with the other Internal Intelligence teams to update and improve intelligence products and collection processes
  • Provide targeting analysis in support of all source collection activities
  • Use knowledge, creativity, critical thinking, and analytic tradecraft best practices to obtain solutions to complex problems where analysis of situations or data requires an evaluation of intangible variables under conditions of uncertainty
  • Participate in trend / correlation analysis and scenario forecasting at both the tactical and strategic level
  • Ensure timely response to all suspense deadlines and administrative actions


  • Undergraduate degree in cyber security, computer science, intelligence studies, criminal justice, journalism, or equivalent experience
  • An engaging personality supported by an inquisitive, analytical mind
  • Strong communication skills with clear and concise writing; able to build a compelling and effective narrative.
  • Ability to work in fast-paced environment, to triage and to work within a small, highly-technical group while providing explanations to non-technical people
  • Ability to work as part of a distributed virtual analysis team with limited supervision
  • 3 + years’ experience in Information Security, gained in a hands-on technical or intelligence role
  • Ability to dynamically analyze malicious code and related threats
  • Understanding of how operating systems work and the ways malware interacts with them
  • Understanding of common network traffic protocols and familiarity with common network traffic analysis techniques
  • Past exposure to a variety of malware families used by Espionage or Criminal campaigns
  • Significant experience with the following concepts and related tool sets:
  • Network sniffers


  • Practical experience as an intelligence analyst
  • Ability to perform dynamic and static code analysis
  • 3+ years experience working with malware or exploits, or engaged in either threat research or incident handling
  • Experience with vulnerability management, penetration testing, scripting, programming, reverse engineering and similar job experience
  • Experience with scripting or programming languages, notably VB, C++, Perl or Python
  • Preferred certifications: GIAC Reverse Engineering Malware (GREM), GIAC Certified Incident Handler (GCIH) or GIAC Certified Forensics Analyst (GCFA)