The Cybereason system detects both known and unknown malicious operations (malops). Based on our deep knowledge and understanding of diverse attack techniques, we identify unknown malops by detecting irregular legitimate behaviors and suspicious malicious behaviors.
The Malop Library Developer will join our work on mapping and implementing proof of concepts (POC) for the different attack techniques.
The intern will be responsible for:
-Learning and researching existing attack techniques
-Implementing “malicious” code that executes each technique,
-Running the Cybereason system to verify its efficacy in detecting this behavior
-Suggesting detection algorithms when the Cybereason system fails verification tests
The intern must be able to quickly learn low level concepts of Windows operating system and have high execution abilities that will allow her/him to write code that implements these concepts.
-Professional in Windows internals
-Proven experience in writing C/C++ low level code
-Knowledge in assembly and RE – a plus
Cybereason delivers a proprietary technology platform that automatically uncovers malicious operations (Malops™) and reconstructs them as a clear image of a cyberattack in context. Founded in 2012 by a team of ex-military cybersecurity experts, Cybereason enables enterprises to discover sophisticated targeted threats at a very early stage, disrupt them at the stem and significantly reduce the costs and damages caused by such attacks. Cybereason provides an endpoint detection and response platform, deploying a user-level easy to deploy, frictionless endpoint silent sensor and deploying an analytical engine to detect even faint evidence of malicious activity.