Security Researcher

Welcome to the future of cloud networking and security!  

Cato Networks is the first company to converge enterprise networking and security into one centralized and global service that is delivered by cloud. Cato’s unique technology inspired a brand-new product category, later named “SASE” by Gartner. 

Cato is the brainchild of networking and security pioneers Shlomo Kramer (Check Point, Imperva) and Gur Shatz (Incapsula.) Cato Networks has raised $773 million dollars since 2015, achieving Centaur status with $100M+ in ARR, and a valuation of $3 billion dollars.

This is your opportunity to get on the rocket ship and join a company that is building a cutting-edge enterprise network and secure cloud platform and is on a fast track to becoming the worldwide market leader – don’t miss it!

We are looking for an experienced Security Researcher to join our team. Being a member of our creative and highly experienced research team, which is responsible for designing the security models that protect Cato customers worldwide. You will specialize in malware hunting and threats discovery over various types of networks, utilizing data analytics techniques on top of Cato Cloud’s data warehouse (our big-data platform). You will also take part in our thought leadership activities, writing and expressing your research on the media.

Responsibilities: 

  • Development of analysis tools and infrastructure to support the team’s research activities
  • Be part of the malware-hunting activities utilizing Cato cloud big-data using analysis techniques that you will design, build and automate
  • Publication and demonstration of research results, writing new content to our blog, and other types of media.
  • Reproduction and demonstration of malicious attacks and plan mitigation
  • Research and in-depth analysis of network-based vulnerabilities, adding mitigations and engine capabilities to the core product, working closely with engineering teams.

Requirements:

  • BSc in Computer Science - must
  • In-depth knowledge and background in general networking and protocols (TCP/IP, DNS, SSL, HTTP, DHCP, Routing protocols, etc.) - must
  • Strong understanding of common threat scenarios and attack techniques (Malware infection, C&C communication, Drive-by attacks, Phishing, Network scans) - must
  • Excellent written communication and verbal skills - publishing research in the past.
  • Proficiency with at least one programming language such as Python, or Java - must
  • Passion for analytics and attack vectors investigation using big data platforms - NoSQL and relational DBs (MongoDB, Elasticsearch, MySQL, AWS Athena)
  • Experience with big data frameworks (Spark) - an advantage
  • Hands-on experience with analysis tools such as Wireshark, Metasploit, Nessus, Snort, Scapy
  • Advantage: Malware analysis and machine forensics: experience with analysis tools such as volatility, Yara, Windbg, or similar tools
  • Excellent English and communication skills
  • Team player, responsible, and well-organized