Perform in-depth threat research, malware reverse engineering, incident investigation/log analysis, evaluates new technologies in partnership with engineering team, and. Write custom signatures (IPS/IDS, Yara, etc.) and fine-tune existing threat signatures....