Research security threats, attacker techniques and tools, 0-day vulnerabilities and other in-depth research on novel threats
Write in-depth technical advisories about threats and signatures
Analyze malware samples and vulnerable binaries using static/dynamic analysis debuggers to Build advanced signatures and detection content for Snort, ClamAV, AMP, and other Cisco products
Create testbed environments to research and run exploits
Develop tooling that forwards the mission of the team
Participate in advanced research projects
Minimum Qualifications:
3+ years professional and/or educational experience with analyzing, identifying, and exploiting a wide variety of vulnerability types, such as buffer overflows, integer overflows, cross-site and server-side request forgery attacks, insecure deserializations, and/or authentication bypasses
3+ years professional and/or educational experience using packet analysis tools like Wireshark to analyze network or transport, and application layer protocols, such as IP, TCP, LDAP, TLS, RDP or SMB
3+ years professional and/or educational experience with a compiled language (e.g. C, C++, Rust, Go) and/or a scripting language (e.g. Python, Ruby, Perl)
Preferred Qualifications:
Expertise with the structure of common file formats, such as PDF, MS Office, EXE, ELF and an ability to identify anomalies using popular file-analysis tools such as 010 Editor
Expert knowledge of operating system internals and familiarity with concepts such as: application memory layout, C runtime or OS-related functions, kernel vs user space functionality
Expertise with reverse engineering, malware analysis, and relevant tools (e.g.IDA Pro, Binary Ninja, Ghidra, radare2, x64dbg, WinDbg, OllyDbg), as well as analyzing assembly code and identifying code patterns in disassembled binaries
5+ years of related industry experience in roles like: incident response, intrusion detection, forensic analysis, pentesting or red teaming, or vulnerability development
Experience with detection content engineering such as Snort rules language
Master's degree or equivalent experience Computer Science, Cyber Security, or other tech-related degree