• 20 active jobs (view)

  • Published: June 13, 2022
Job Type
Level of education
Level of Hebrew
Location of job
Petach Tikva
How many relevant years experience do you require for the role:
More than 3 years


Join us on our mission of protecting organizations against the most advanced attackers in the world!

Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited.

Pentera has 150 employees around the Globe (Israel, USA, Switzerland, Germany, Italy, France, Sweden, Spain, UK and UAE) with more than 400 customers in Production in over 40 countries.

Pentera has won various Industry Awards, such as “The Frost and Sullivan Value Leadership Award- 2019″ and the “2020 Gartner Cool Vendor Award” and is backed by Top tier investors such as Insight Partners, The Blackstone Group & AWZ.

At Pentera, we use many data sources and large amounts of data to research, identify, prioritize, and make product-related decisions.

About the Role

We are looking for an all-around offsec attack researcher to join our group and become part of the revolution.

Roles & Responsibilities:

- Conduct state of the art research and be one step ahead of real threat actors.
- Integrate the research outputs into attack platforms for enhancing the automation ecosystem with new attack capabilities.
- Develop decision-making algorithms to bridge the gap between an automated system and an experienced human attacker
- Develop production-ready attack capabilities. What development language is relevant? WHATEVER IT TAKES!
- Python, C/C++, CSharp, Java, Office Macros, Bash, Powershell, Go, Ruby,…
- Mentor other members of the R&D team.

So, can we offer you the red pill and join our journey to create the ultimate automated hacker?


- 5+ Years of practical experience in red/blue team engagements
- 5+ Years of experience in Python development
- 3+ Years of experience in Win32/Linux development
- Binary analysis with IDA/Radare2/Hex Editor ;-)/…
- Familiarity with common open-source attack platforms
- Metasploit, Nmap, Beef, Cobalt Strike, Impacket, Burp
- Excellent teamwork skills
- Fast learner and quick on adapting to new technologies and fields


- IDF cyber team veteran
- Experience and passion for cyber oriented research
- Experience with working in Agile Methodology
- Experience in the following attack areas:
- Cloud and hybrid environments
- Web applications
- Vulnerability research
- Binary exploitation
- ARM/PPC reversing
- Hands-on experience with the Java development language
- Bachelor’s degree in Computer Science or a related field

Come Hack With Us!

(Check on your spam box)
Drop files here browse files ...

Related Jobs