Deep security research and malware analysis for high-threat environments
Cyberillium operates a specialized security research and tooling practice built around 0-day discovery, malware analysis, and low-level systems hardening. The stack—IDA, Ghidra, Frida, YARA, debuggers, and emerging AI-powered analysis—reflects a focus on reverse-engineering and threat intelligence work. Heavy hiring concentration in senior security roles (3 principal/lead/senior across 5 open positions) signals a lab-stage company scaling research output rather than sales velocity.
Notable leadership hires: Tech lead
Cyberillium is a Tel Aviv-based security research firm founded in 2021, operating with 11–50 employees. The company combines manual vulnerability research—including 0-day discovery and proof-of-concept development—with automated and AI-augmented malware analysis platforms. Their active project portfolio spans traditional reverse-engineering work (YARA rules, defensive research roadmaps) and emerging AI-native threat intelligence, including offline model management and secure air-gapped deployment modes. They serve organizations managing mission-critical cloud and on-premises infrastructure that require depth-first security validation and threat hunting.
Python, C, IDA, Ghidra, Frida, QEMU, Wireshark, Linux, Windows, iOS, Android, gdb, WinDbg, ftrace, YARA, Rust, AWS, and GCP. Heavy emphasis on reverse-engineering, debugging, and dynamic analysis tools.
0-day vulnerability research, automated malware analysis platforms, agentic AI threat intelligence systems, YARA detection rules, secure air-gapped deployments, and defensive research roadmaps.
Other companies in the same industry, closest in size