IE is not supported

Please use a modern browser, like Chrome, Firefox or Safari

SAFE. IN THE DEEP SENSE.

0%

DEEP INSTINCT

THE FIRST COMPANY TO APPLY DEEP LEARNING TO CYBERSECURITY.
Unmatched zero-day attack protection for endpoints and mobile.

Mobile

Real-time, connectionless
on any device, any OS.

Mobile APT detection and prevention

Unprecedented, real-time detection and prevention of zero-day threats on the entire organization’s mobile device infrastructure.

Deep Instinct™ provides real-time detection and prevention of zero-day threats and advanced persistent threat (APT) attacks for mobile devices and endpoints. Instead of reactive, compartmentalized behavioral, sandboxing or even machine learning solutions, the proactive protection provides unprecedented accuracy in detection and real-time prevention, protecting the organization’s entire assets from any threat (known and unknown) on any infrastructure.

Deep Instinct™ approaches cybersecurity from a completely different angle:

  • From reactive to proactive defense
  • From expecting the next unexpected attack to predicting and preventing it

Deep Instinct™ provides complete protection to mobile devices in real-time, using a lightweight agent that has no impact on the user experience. The solution fully secures any device, on any operating system. Protection against first-seen threats and APT attacks is ongoing, even when the mobile device is not connected to the organization’s network or to the Internet.

Deep Instinct™ offers a solution that is comprised of three components:

D-BRAIN

D-Brain is the core component of the deep learning cyber defense solution by Deep Instinct™. It is hosted at the Company's headquarters and performs continuous learning of cyber threats. D-Brain provides real-time cyber threat intelligence capabilities as a result of continuous learning on malware datasets from diverse sources.

D-APPLIANCE

D-Appliance utilizes the updates from D-Brain to provide a powerful, intuitive, visualization and management tool for configuring the organization's security policy and enable in-depth monitoring of cyber threats. D-Appliance has the unique capability to manage organization's devices, security events and security compliance policy in the same place.

D-CLIENT

D-Client encompasses the essence of the prediction model of Deep Instinct™. It enables on-device, connectionless, lightweight, real-time cyber threat prevention. After installation, D-Client scans the mobile device and acts proactively and automatically according to the organization’s policy, as it is defined in D-Appliance, even when the mobile device is not connected to the organization’s network or to the Internet.

ENDPOINTS

On-device, real-time, connectionless protection.

Endpoints APT detection and prevention

Unprecedented, real-time detection and prevention of known and unknown threats on the entire organization’s endpoints infrastructure.

Deep Instinct™ provides real-time detection and prevention of zero-day threats and advanced persistent threat (APT) attacks for endpoints and mobile. Instead of reactive, compartmentalized behavioral, sandboxing or even machine learning solutions, the proactive protection provides unprecedented accuracy in detection and real-time prevention, protecting the organization’s entire assets from any threat (known and unknown) on any infrastructure.

Deep Instinct™ approaches cybersecurity from a completely different angle:

  • From reactive to proactive defense
  • From expecting the next unexpected attack to predicting and preventing it

Deep Instinct™ provides complete protection to endpoints in real-time, using a lightweight agent that has no impact on the user experience. Deep Instinct™ provides a cyber solution that fully secures endpoints, on any operating system. Protection against first-seen threats and APT attacks is ongoing, even when endpoints are not connected to the organization’s network or to the Internet.

Deep Instinct™ offers a solution that is comprised of three components:

D-BRAIN

D-Brain is the core component of the deep learning cyber defense solution by Deep Instinct™. It is hosted at the Company's headquarters and performs continuous learning of cyber threats. D-Brain provides real-time cyber threat intelligence capabilities as a result of continuous learning on malware datasets from diverse sources.

D-APPLIANCE

D-Appliance utilizes the updates from D-Brain to provide a powerful, intuitive, visualization and management tool for configuring the organization's security policy and enable in-depth monitoring of cyber threats. D-Appliance has the unique capability to manage organization's devices, security events and security compliance policy in the same place.

D-CLIENT

D-Client encompasses the essence of the prediction model of Deep Instinct™. It enables on-device, connectionless, lightweight, real-time cyber threat prevention. After installation, D-Client scans the mobile device and acts proactively and automatically according to the organization’s policy, as it is defined in D-Appliance, even when the mobile device is not connected to the organization’s network or to the Internet.

EASY DEPLOYMENT

Simple and fast,
seamless
light agents with
no impact on the user experience.
Read More

Easy Deployment

Deployment of the lightweight agents is a quick and smooth process. Once deployed on the organization’s devices, the lightweight agents constantly scan, predict, and protect all activities, on all endpoints and mobile devices, without impacting the user experience. Protection activities are defined according to the organization’s security policy and work in parallel to any previously-installed security agents.

CONNECTIONLESS COVERAGE

Direct, connectionless,
immediate action
on any device.
Read More

Connectionless Coverage

The massive features dataset combined with a light prediction model enables direct and immediate action – detection, prediction, and prevention – on any mobile device and PC, even when the device is not connected to the organization’s network. The on-device agent enables complete protection when using personally-owned devices that interface with corporate devices (BYOD).

INFRASTRUCTURE AGNOSTIC

Any device, any OS,
any mobile, any server.
Read More

Infrastructure Agnostic

The adoption of standalone solutions for mobile devices, endpoints, firewalls, sandboxes, etc., result in a patchwork system that fails to thoroughly protect the organization against all sophisticated cybersecurity threats. The solution that Deep Instinct™ offers is greater than the sum of these parts.

Data features are broken-down into the smallest parts in the course of the predictive process, rendering the data source irrelevant. This enables a comprehensive solution that instinctively detects and prevents any threat on any infrastructure.

Deep Instinct™ provides complete, real-time protection on endpoints and mobile devices even when they are not connected to the organization’s network or to the Internet.

ACCURATE PREDICTION OF
UNKNOWN CYBER THREATS

Unprecedented accuracy.
Predictive capabilities
through proprietary
deep learning algorithms.
Read More

Accurate Prediction of Unknown Cyber Threats

Proprietary deep learning algorithms create a learning prediction model that delivers unprecedented accuracy, securing all of the organization’s assets. The exceptional level of accuracy detects threats and renders false positives obsolete.

In addition to immediate detection of known malicious behavior, gone are the days when hackers can make slight changes that cause malware to be considered previously unseen. Deep learning’s capacity to identify malware instantly detects zero-day threats before an attack can take place, on any device and operating system.

REAL-TIME APT
DETECTION AND PREVENTION

Against first-seen,
malicious activities
on the organization’s
entire assets.
Read More

Real-Time APT Detection & Prevention

Deep Instinct™ leverages the power of deep learning to gain a substantial advantage over the range of existing cybersecurity solutions. Instead of reactive, compartmentalized behavioral, sandboxing or even machine learning solutions, the proactive protection provides unprecedented accuracy in detection and real-time prevention.

The organization’s entire assets are protected with unmatched detection rates of known and unknown threats from any source, in real-time. Unpatched vulnerabilities, metamorphic and polymorphic malware, and zero-day exploits, are detected in real-time and prevented before an attack can occur.

EASY DEPLOYMENT

Simple and fast,
seamless.
Light agents with
no impact on the user experience.
Read More

Easy Deployment

Deployment of the lightweight agents is a quick and smooth process. Once deployed on the organization’s devices, the lightweight agents constantly scan, predict, and protect all activities, on all mobile devices and endpoints, without impacting the user experience. Protection activities are defined according to the organization’s security policy and work in parallel to any previously-installed security agents.

CONNECTIONLESS COVERAGE

Direct, connectionless,
immediate action
on any device.
Read More

Connectionless Coverage

The massive features dataset combined with a light prediction model enables direct and immediate action – detection, prediction, and prevention – on any mobile device and PC, even when the device is not connected to the organization’s network or to the Internet. The on-device agent enables complete protection when using personally-owned devices that interface with corporate devices (BYOD).

INFRASTRUCTURE AGNOSTIC

Any device, any OS,
any mobile, any server.
Read More

Infrastructure Agnostic

The adoption of standalone solutions for mobile devices, endpoints, firewalls, sandboxes, etc., result in a patchwork system that fails to thoroughly protect the organization against all sophisticated cybersecurity threats. The solution that Deep Instinct™ offers is greater than the sum of these parts.

Data features are broken-down into the smallest parts in the course of the predictive process, rendering the data source irrelevant. This enables a comprehensive solution that instinctively detects and prevents any threat on any infrastructure.

Deep Instinct™ provides complete, real-time protection on mobile devices and endpoints even when they are not connected to the organization’s network.

ACCURATE PREDICTION OF
UNKNOWN CYBER THREATS

Unprecedented accuracy.
Predictive capabilities
through proprietary
deep learning algorithms.
Read More

Accurate Prediction of Unknown Cyber Threats

Proprietary deep learning algorithms create a learning prediction model that delivers unprecedented accuracy, securing all of the organization’s assets.

In addition to immediate detection of known malicious behavior, gone are the days when hackers can make slight changes that cause malware to be considered previously unseen. Deep learning’s capacity to identify malware instantly detects zero-day threats before an attack can take place, on any device and operating system.

REAL-TIME APT
DETECTION AND PREVENTION

Against first-seen,
malicious activities
on the organization’s
entire assets.
Read More

Real-Time APT Detection & Prevention

Deep Instinct™ leverages the power of deep learning to gain a substantial advantage over the range of existing cybersecurity solutions. Instead of reactive, compartmentalized behavioral, sandboxing or newer machine learning solutions, the proactive protection provides unprecedented accuracy in detection and real-time prevention.

The organization’s entire assets are protected with unmatched detection rates of known and unknown threats from any source, in real-time. Unpatched vulnerabilities, metamorphic and polymorphic malware, and zero-day exploits, are detected in real-time and prevented before an attack can occur on any of the organization’s assets.

Data Fragmentation

Each object is broken-down into its smallest parts. Process is agnostic to data’s origin.

Data Fragmentation

Each object is broken-down into its smallest parts regardless of its origin (endpoints and mobile).

Datasets are continuously collected from diverse sources of endpoints and mobile. Unlike common machine learning techniques, which manually collect limited pre-defined features, Deep Instinct™ extracts millions of features per item in a weightless manner, without human involvement. This automatic process enables the identification of first-seen cyber threats.
The outcome of this innovative process is the unique ability to identify unknown suspicious behavior.

Deep Learning

Proprietary, deep learning algorithms.
Continuous learning.

Deep Learning

Proprietary, state-of-the-art, deep learning algorithms run on all the data, creating a predictive model for real-time cyber intelligence.

Deep Instinct™ is the first company to apply deep learning to the world of cybersecurity. Deep learning is a novel adaptation of neural networks, which is inspired by the way the human brain works.

The proprietary deep learning technology has been developed by the dedicated research team at Deep Instinct™, headed by Dr. Eli David, one of the leading researchers in the field of computational intelligence. The proprietary deep learning technology undergoes a constant learning process by training on massive structured and unstructured datasets from diverse sources. The result is a continuously updated lightweight prediction model for real-time cyber intelligence that is distributed to agents deployed on the customer’s premises.

Processing a multitude of data sources provides powerful detection, prediction, and prevention abilities of known and unknown cyber threats.

Predictive Capabilities

Lightweight, real-time cyber intelligence. Distributed across the organization’s infrastructure.

Prediction

Powerful predictive capabilities accurately detect unknown threats from any source, in real-time, before any attack can occur.

The on-device, real-time capability of detecting previously-unseen malware, enables instinctive protection. It foregoes the need to spend time sending suspicious malware to a sandbox and delivers proactive defense against threats, before any attack takes place. The industry-first detection and prevention results achieved by Deep Instinct™ are benchmarked against key competitors on a daily basis.

The end-result of this innovative process is the ability to identify and prevent even the most evasive cyber-attacks, from any source, on any device (mobile and endpoints).

Data Fragmentation

Each object is broken-down into its smallest parts Process is agnostic to the data’s origin

Data Fragmentation

Each object is broken-down into its smallest parts regardless of the data's origin (endpoints and mobile).

High-quality, large-scale datasets are continuously collected from diverse sources. Unlike common machine learning techniques, which rely on a very limited, handcrafted set of data, Deep Instinct™ fragments each data object to its elementary building blocks, amounting to millions of unique data per item.
The outcome of this innovative process is the unique ability to identify even the most evasive cyber threats from any source, before an attack takes place.

Deep Learning

Proprietary, deep learning algorithms
Continuous learning

Deep Learning

Proprietary, state-of-the-art, deep learning algorithms run on all the data, creating a predictive model for real-time cyber intelligence.

An advanced branch of artificial intelligence technology, deep learning is inspired by the way the brain thinks. Deep learning uses millions of the extracted building blocks to assemble high level representations for the purpose of learning how to distinguish between harmful and benign objects.

This automatic processing of a multitude of data sources provides powerful detection, prediction, and prevention abilities of known and unknown cyber threats.

The result is a continuously updated lightweight prediction model for real-time cyber intelligence that is distributed to agents deployed on the customer’s assets.

Predictive Capabilities

Lightweight, real-time cyber intelligence Distributed across the organization’s infrastructure

Prediction

Powerful predictive capabilities accurately detect unknown threats from any source, in real-time, before any harm can occur.

The on-device, real-time capability of detecting previously-unknown malware, enables instinctive protection. The industry-first detection and prevention results achieved by Deep Instinct™ are benchmarked against key competitors on a daily basis.

The result of this innovative process is a continuously updated, accurate prediction model for real-time cyber intelligence on known and unknown threats from any source, on any device.

THE FIRST COMPANY TO APPLY DEEP LEARNING TO CYBERSECURITY

At the meeting point of mathematics and cybersecurity, 85% of the company’s interdisciplinary group holds Ph.D. and M.Sc. degrees in mathematics with a wealth of experience in operational cybersecurity. The group includes veterans of special cyber units in the Israel Defense Forces (IDF) and experienced executives from top global security vendors.

The dedicated deep learning research group at Deep Instinct™ is headed by Dr. Eli David, one of the leading researchers in the field of computational intelligence. Deep Instinct™ holds proprietary intellectual property deep learning libraries, developed in the company.

Deep Instinct™ Israel is headquartered in Tel Aviv and Deep Instinct™ USA is headquartered in San Francisco, CA.

Management

Guy Caspi, Chief Executive Officer

Mr. Caspi is a leading mathematician and a data scientist global expert. Mr. Caspi has 15 years of extensive experience in applying mathematics and machine learning in a technology elite unit of the Israel Defense Forces (IDF), financial institutions and intelligence organizations around the world. Mr. Caspi led some of the largest government cyber and Big Data projects in Israel and other countries. In addition, Mr. Caspi was the president and general manager of a leading division at Comverse/Verint Group. Mr. Caspi brings substantial management background in leading innovative technological challenges from R&D through commercialization. Mr. Caspi holds B.Sc., M.Sc., and MBA degrees in Mathematics, Machine Learning and Business from leading universities in Israel and the U.S.

Dr. Eli David, Chief Technology Officer

Dr. Eli David is one of the leading global experts in the field of computational intelligence, specializing in deep learning (neural networks) and evolutionary computation. He has published more than thirty papers in leading artificial intelligence journals and conferences, mostly focusing on applications of deep learning and genetic algorithms in various real-world domains. For the past ten years, he has been teaching courses on deep learning and evolutionary computation at Bar-Ilan University, in addition to supervising the research of graduate students in these fields. Dr. David has also served in numerous capacities successfully designing, implementing, and leading deep learning based projects in real-world environments.

Dr. David is the developer of Falcon, a grandmaster-level chess playing program, which automatically learns by processing datasets of chess games. The program reached the second place in World Computer Speed Chess Championship 2008 relying solely on machine learning for its performance. Dr. David received the Best Paper Award in 2008 Genetic and Evolutionary Computation Conference, the Gold Award in the prestigious "Humies" Awards for Human-Competitive Results in 2014, and recently the Best Paper Award in 2016 International Conference on Artificial Neural Networks.

Yoel Neeman, Head of Corporate

Mr. Neeman has over 20 years of business and legal experience with a focus on M&A, joint ventures, strategic alliances and partnerships. With substantial international experience leading complex M&A transactions and strategic partnerships on every continent on the globe, Mr. Neeman has rich experience in leading global financial operations and guiding companies through the early stages to sales and IPOs. A successful solver of complex business problems, he has the unique ability to bridge business and cultural gaps. Mr. Neeman has a LLB and LLM with distinction from the Hebrew University and from New York University respectively. He worked for several years at Skadden in New York and was chosen as one of the 300 influential young people in Israel by Forbes magazine.

Holly Whalen, Senior Vice President, Sales

Ms. Whalen brings to her role over twenty years of enterprise software experience working for companies at early stage & large Tier 1 brands such as McAfee/Intel, Oracle, Siebel Systems, JD Edwards, with an early career in public accounting. Ms. Whalen has been in the enterprise security market since 2005 having led sales team efforts for various start-up technologies including: whitelisting, machine learning & virtual isolation. Prior to Ms. Whalen’s foray into the enterprise security market, she developed an extensive career in the enterprise business application markets across ERP, CRM & Business Analytics, commencing her enterprise software career as an implementation consultant, providing deployment consulting to the Tier 1 market segment.

Nadav Maman, Vice President, R&D

Mr. Maman brings 15 years of experience in customer-driven businesses and technical leadership. He has a proven track record in managing technical complex cyber projects, including design and execution, pre-sales and post-sales. Mr. Maman held various senior management positions in Check Point Software technologies for over six years. He was responsible for global technical services. Mr. Maman has vast hands-on experience with data security, network design, and implementation of complex heterogeneous environments. He was an intelligence officer in a well-known IDF technological cyber unit for seven years. Mr. Maman was recruited to Israel's top technology intelligence unit, where he led design and establishment of military data security infrastructures and platforms. As an officer, Mr. Maman received an award for his excellence in leadership and performance.

Maya Schirmann, Chief Marketing Officer

With over 15 years of extensive experience as a marketing, strategy, and sales executive, Ms. Schirmann has a proven track record in creating markets and guiding technology corporate organizations to market leadership positions. Ms. Schirmann held various senior strategic marketing and sales positions in Amdocs and Comverse, where she led the launch of innovative products and services as well as large complex deals with global Telecom operators. Ms. Schirmann is originally from France where she worked for the telecom operator SFR for which she has led to success the launch of numerous innovative services, such as the first mobile email, MMS, and Vodafone Live. Ms. Schirmann holds a Master’s Degree in mathematics from Jussieu Paris 7 University.

Efrat Turgeman, Chief Financial Officer

Ms. Turgeman has extensive auditing and accounting experience in the public and private sector, in Israel and internationally. Ms. Turgeman held various accounting and internal auditing positions, including in PwC Israel and Nice Systems. Ms. Turgeman has an MBA with a specialization in accounting from the College of Management. Ms. Turgeman is an alumni of the Israeli Defense Force’s 8200 Unit.

Roni Berezin, Chief Human Resources Officer

Ms. Roni Berezin is a seasoned Human Resources leader with 15 years’ experience in large (over 1B$) and medium size companies in the software and communication industries (RR Media, Amdocs, Verint Systems), as well as an organizational consultant.

Ms. Berezin has a proven track record in establishing scalable, global HR infrastructure that leveraged people’s talent and engagement to drive business results in growth companies, as well as extensive leadership development and consulting experience. She also holds domain expertise in leading and executing strategic, complex cross-organizational transformations in enterprises such as cultural agile implementation to improve TTM. Ms. Berezin is the recipient of the “Israeli Society Of Human Resource” 2014 excellence award, for establishing technological leadership path that had massive contribution in accelerating Verint’s organic growth, innovation and IP.

Ms. Berezin has a B.A. in Social Science from Bar-Ilan University and a M.A. in Labor Studies from Tel Aviv University. She graduated both degrees with distinction.

Board

Doron Cohen, Chairman

Mr. Cohen has over 30 years of operational and managerial experience on a wide range of global markets in the forefront of the Israeli defense industry. Mr. Cohen holds a BA in Computer Science from the University of York in Toronto and the Interdisciplinary Center in Herzliya. Mr. Cohen also completed the Directors Program of Tel Aviv University’s Recanati School of Business Administration.

David Blumberg, Director

David J. Blumberg is the Founder and Managing Partner of Blumberg Capital, an early-stage venture capital fund based in San Francisco. David is an authority on early stage investing with more than 25 years of experience. Blumberg Capital funds innovation on a global basis with a focus on Financial Services, Cyber Security, Mobility, Digital and Social Media, Enterprise Software and SaaS. David serves on the boards of CaseStack, Credorax, Deep Instinct, DoubleVerify, FeeX, Fortscale, Kreditech, Trulioo and Wunder. He also serves on the Board of The Lincoln Club of Northern California and is a member of the Pacific Council on International Policy. Prior to Blumberg Capital, David managed international investments with the Bronfman Family Office, Adler & Co, APAX Partners and at T. Rowe Price. He also launched business development for Check Point Software Technologies as one of its top four executives.

David earned his AB in Government, cum laude, from Harvard College and his MBA from the Stanford Graduate School of Business and INSEAD. David speaks French and is proficient in Hebrew and Spanish.

Yaron Eitan, Director

Mr. Eitan is a partner at Columbus Nova Technology Partners (CNTP), a multi stage venture fund with offices in the Silicon Valley and New York. Yaron has twenty years of experience in building number of high tech companies. He is also partner in SCP Partners and the former founder, president, and CEO of Selway Partners, LLC, a technology incubator that was founded in 1998.

Mr. Eitan is Chairman and director of number of companies including, Software Technologies, like XLMedia and Credorax. Prior to founding Selway Partners, from 1989 until 1998 Mr. Eitan was founder, Chairman and CEO of Geotek Communications Inc., Chairman of the Board of Bogen Communications, Inc., and co-founder of Reshef Technologies Ltd., which he co-founded in 1984.

Mr. Eitan holds an MBA from The Wharton School of Business of the University of Pennsylvania and a degree in economics from Haifa University.

Guy Caspi, Director

Mr. Caspi is a leading mathematician and a data scientist global expert. Mr. Caspi has 15 years of extensive experience in applying mathematics and machine learning in a technology elite unit of the Israel Defense Forces (IDF), financial institution and intelligence organizations around the world. Mr. Caspi led some of the largest government cyber and Big Data projects in Israel and other countries. In addition, Mr. Caspi was the president and general manager of a leading division at Comverse/Verint Group. Mr. Caspi brings substantial management background in leading innovative technological challenges from R&D through commercialization. Mr. Caspi holds B.Sc., M.Sc., and MBA degrees in Mathematics, Machine Learning and Business from leading universities in Israel and the U.S.

Yoel Neeman, Director

Mr. Neeman has over 20 years of business and legal experience with a focus on M&A, joint ventures, strategic alliances and partnerships. With substantial international experience leading complex M&A transactions and strategic partnerships on every continent on the globe, Mr. Neeman has rich experience in leading global financial operations and guiding companies through the early stages to sales and IPOs. A successful solver of complex business problems, he has the unique ability to bridge business and cultural gaps. Mr. Neeman has a LLB and LLM with distinction from the Hebrew University and from New York University respectively. He worked for several years at Skadden in New York and was chosen as one of the 300 influential young people in Israel by Forbes magazine.

Investors

Is cybersecurity Instinctive to you?

We are a promising well-funded company, which develops cutting-edge technology for intelligence & cyber defense.

If technology is in your blood, you are striving for excellence, eager to solve complex problems and believe you (or one of your friends) are qualified for one of the descriptions below - Please contact us at careers@deepinstinct.com.

Senior Product Manager (Israel)

Skills and Experience required:

- At least 5 year experience in cybersecurity field

- At least 3 year experience as Product Manager

- Experience in endpoint security products & vendors – An advantage

- Professional hands on programming experience – An advantage

- Experience and knowledge with Hacking techniques to operating systems, infrastructures, communication systems and applications – An advantage

Product Marketing Manager (Israel)

Deep Instinct, the first company to apply deep learning to cybersecurity, is looking for a superstar Product Marketing Manager. We are looking for an enthusiastic, performance-driven and team player who will be the champion for Deep Instinct’s products and solutions, responsible for executing the outbound market strategy and buyer’s journey – as it relates to the products. The role includes the support of the go-to-market programs, including launch planning, collateral, customer presentations, videos, and sales training materials, as well as engage with analysts to evangelize Deep Instinct’s products. The position is both hands-on and strategic. This role requires multitasking in a fast-paced and stressful environment with high-quality and timely deliverables. The position is based in Tel-Aviv and reports to the CMO.

Role & Responsibilities:

- Develop product positioning and messaging that differentiates Deep Instinct’s products in the market

- Understand the market through sales insights, market research and competitive analysis. Become an expert in the category and bring relevant information to the executive team

- Creation/ Development / Updates/ Distribution of collaterals – datasheets, technical specifications, infographics, digital assets, brochures, literatures, demos, white papers, etc.

- Sales enablement - communicate the value proposition of the products to the sales team and develop the sales tools that support the selling process of your products

- Market intelligence – be the expert on Deep Instinct’s buyers: how they buy and their buying criteria, as well as on competition

- Perform regular analysis on competing products’ features, pricing, positioning, and packaging

- Work with Product Management on the products’ roadmap

- Evangelize the company’s vision, architecture and overall product strategy

- The position requires traveling for presentations, training, tradeshows and industry events

Requirements:

- Experience in the cybersecurity field – a MUST

- 5+ years of software product marketing experience with at least 2 years’ experience in a field-facing role

- Previous experience as a Product Manager – a strong advantage

- Experience creating product marketing content, training material and support information

- Bachelor’s in business or marketing

- Solid analytical and business skills

- Very strong written and communication skills

- Well-seasoned presenter

- Willingness to travel. Visiting customers, prospects, and partners will be an essential part of this role, as well as participating in conferences and trade shows

- Excellent people and management skills

- English – mother tongue or very high level of proficiency

MAC OS Internals (Kernel) Senior Developer (Israel)

Skills and Experience required:

- Knowledge of MAC OS-X low-level & kernel architecture

- At least 5 years of professional hands on programming experience

- Knowledge and experience in C/C++ , Objective-C

- Experience and knowledge with Hacking techniques to operating systems, infrastructures, communication systems and applications – An advantage

- Experience with machine learning algorithms – An advantage

DevOps (Israel)

Job Description:

- Work with innovative deep learning technology and CyberSecurity

- Support application development teams throughout project life cycles

- Recommend and execute modifications to Linux systems in order to improve efficiency, reliability, and performance

- Create Linux shell scripts

- Make architectural design decisions, solve technical problems, and make improvements to our systems.

- Collaborate in a DevOps environment where you will work closely with software developers, algorithm researchers, QA and more.

Skills and Experience required:

- Experience with tools like; Docker, Git version control, RESTful APIs, Jenkins or Maven is preferable

- Automation experience (infrastructure automation); configuration management; deployment; monitoring; log management & application / performance management

- 5+ years’ experience with Linux distributions (ideally Ubuntu); installation, configuration and performance tuning

- 1+ year of experience utilizing Ansible / Puppet / Chef / CFEngine

- Experience with systems automation and configuration management.

- Knowledge of operational and security best practices.

- Autodidact

Senior User Interface Developer (Israel)

We are looking for a top-end User Interface Engineer with the ability to design and develop the next-generation interfaces for security products. As a Senior User Interface Developer, you will be responsible to differentiate deeply from the current security products by designing, developing, and testing innovative front-end features. You will establish our brand identity by developing highly interactive and usable products (both web-based and mobile).

Skills and Experience required:

- At least 5 years of professional hands on programming experience with proven track of records

- University academic degree in CS/EE (minimal avg. 80) or relevant military experience – must, MSc – an advantage

- Highly proficient in HTML / CSS, JavaScript

- Hands-on experience with AngularJS, Node.js

- Core Java knowledge

- SaaS experience or good understanding of public clouds such as AWS or Azure – An advantage

- Experience with security technologies – An advantage

Senior Server Side Developer (Israel)

Skills and Experience required:

- At least 5 years of professional hands on programming experience

- University academic degree in CS/EE (minimal avg. 80) or relevant military experience – must, MSc – an advantage

- Extensive knowledge of Linux OS, Linux network stack

- Experience with high performance network processing, data plane offloading and network security

- Excellent C/C++ skills

- Linux system internals

- Strong Database knowledge (SQL / Oracle)

- Network programming

- Ability to self-manage and prioritize work programs

- Understanding of large scale problem solving and system engineering

- Knowledge of DPI, network security and visibility technologies – An advantage

- Experience with reverse engineering techniques and tools (windbg, IDA, Ollydbg etc.) – An advantage

- Experience with machine learning algorithms. – An advantage

Windows Internals Senior Developer (Israel)

Skills and Experience required:

- At least 5 years of professional hands on programming experience

- Knowledge and experience in Assembler/C/C++

- Knowledge and experience in assessing IDA program codes

- Kernel level expertise in operating systems

- Knowledge and experience with TCP/IP – up to sockets level

- Experience in Reverse Engineering and Exploits

- Experience and knowledge with Hacking techniques to operating systems, infrastructures, communication systems and applications

- Experience with machine learning algorithms – An advantage

Algorithms Team Leader (Israel)

Skills and Experience required:

- Lead the team of the algorithms research and development.

- Design and implement innovative algorithms in the field of machine learning

- Clustering, unsupervised learning research - An Advantage

- PhD/M.Sc. in Mathematics/Computer Science

- 3+ years in Machine learning research and production implementation experience.

- Algorithm development experience.

- Team management experience.

- Published papers on a significant research in machine learning or related field.

- Neural Networks experience – an advantage.

Security Researcher (Israel)

Job description:

Security research position for analyzing available and new attack vectors in the fields of Windows, Mobile and Network

Skills and Experience required:

- Cyber-security expert (Network, Endpoints – Windows internals & Mobile, defending and attack techniques)

- Experience in the fields of penetration testing, vulnerability research and exploit development

- Scripting languages (Python)

- Passion for technology, autodidact, independent, responsible and innovative

- Strong analytical and problem solving capabilities

- Experience with reverse engineering tools (IDA Pro, WinDbg, OllyDbg, etc.)

- Development languages – C, Assembly – An advantage

- Relevant military experience (Aram, Silan) or academic degree(s) in CS/EE – An advantage

Cyber-security Intelligence Analyst (Israel)

Job description:

- Proactively monitoring open source intelligence feeds for threats, attack vectors, new product versions

- Reviewing latest researches & reports

- Producing reports based on findings

- Maintaining current knowledge of threats, vulnerabilities and attack vectors

- Managing the core database of the company, on-going communication as part as a running protocol on that database

Skills and Experience required:

- Prior experience working in the Intelligence Community – Must

- Requires open source and intelligence research expertise and strong link analysis skills

- Programming / scripting language (such as Bash/Python) for automation processes – An advantage

- Must have familiarity with and understanding of current known hacking techniques and cyber threats, tools, vulnerability disclosures, data breach incidents

- Excellent knowledge of security analysis techniques and attack vectors in the following environments: Windows, Linux, Mobile, Traffic

- Passion for technology, autodidact, independent, responsible and innovative

Application Security Researcher (Israel)

Job description:

- Guidance for the whole SDLC process: starting from architecture and design, vulnerability assessments, code review and penetration testing

- Performing the whole process in a few platforms: Windows, mobile, Server-side, Web (client-side)

- Experience in the following languages: C/C++, Java

Skills and Experience required:

- Vast experience in the fields of application vulnerability assessments methods

- Vast experience in the fields of penetration testing – concepts, tools (vulnerability scanners, forensics tools)

- Experience in the platforms of Windows, Android

- Experience in the platforms of MacOSx, Linux, iOS – an advantage

- Experience in Server-side, Client-side (web – OWASP)

- Experience with the application development: C/C++, Java, Objective-C, Angular

- Experience with the application development: Objective-C, Angular – an advantage

- At least 2 years of experience in the field of software development

- At least 2 years of experience in the field of application security

- Passion for technology, autodidact, independent, responsible and innovative

- Relevant military experience (Matzov) or academic degree(s) in CS/EE – An advantage

PS Engineer (US,Israel)

Job description:

Ability to travel internationally approximately 50% of the total time

- Leading proof of concepts and evaluations on site

- Advising best practice security technologies and capabilities, advantages, and effectiveness based on implementation

- Providing consultation in support or troubleshooting customer installs / integrations

- Create general knowledge transfer documents and lead client sessions

- Work closely and collaboratively with project managers, product managers, operations and other engineers to ensure high-quality implementations and on-time delivery and post-implementation technical support

- Leading hands on troubleshooting efforts in customer environments

Skills and Experience required:

- 3+ years relevant Professional Services, Support Engineer or Integration Engineer

- 3+ years' experience with Security Products

- Training and consulting/installations/deployment

- Thorough knowledge with security products hands-on wise

- Experience in working with customers + Their sites + Face to face

- Experience with IP based networks, network design, and security products

- Experience with low level debugs analysis

- Experience with operating systems: Windows platforms, Unix/Linux- based

- Project management capabilities; adjusts quickly to changing priorities and conditions. Copes effectively with complexity and change.

- Basic understanding of mobile platforms

- Perfect English

- Advantage: Experience with iOS and Android OS

Soft Skills:

- Time management

- Interpersonal communication

- Problem solving

- Performing in front of audience

- Autonomous - self managed and motivated

- Crisis management

- Multi-Tasking

- Ability to take ownership of your work, identify problems, and implement solutions

- Excellent communication and collaboration skills

Media Inquiries

If you are a media professional and would like to learn more about Deep Instinct™,
contact us : media@deepinstinct.com

SEND

Deep Instinct™ Israel

LEVINSTEIN TOWER
23 DERECH MENAHEM BEGIN
Tel Aviv-Yafo, 6618356 Israel Phone: +972 (3) 545-6600

Deep Instinct™ USA

501 Folsom Street, Suite 400
San Francisco, CA 94105, USA
Phone: +1 (855) 522-2223
20 Enterprise, 4th Floor
Aliso Viejo, CA 92656, USA
Phone: +1 (855) 522-2223