Expoint - all jobs in one place

מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר

Limitless High-tech career opportunities - Expoint

Cisco Research Engineer 
United States, Georgia, Atlanta 
75073940

05.02.2025


What you ‘ll do:
  • Research security threats, attacker techniques and tools, 0-day vulnerabilities and other in-depth research on novel threats
  • Write in-depth technical advisories about threats and signatures
  • Analyze malware samples and vulnerable binaries using static/dynamic analysis debuggers to Build advanced signatures and detection content for Snort, ClamAV, AMP, and other Cisco products
  • Create testbed environments to research and run exploits
  • Develop tooling that forwards the mission of the team
  • Participate in advanced research projects

Minimum Qualifications:
  • 3+ years professional and/or educational experience with analyzing, identifying, and exploiting a wide variety of vulnerability types, such as buffer overflows, integer overflows, cross-site and server-side request forgery attacks, insecure deserializations, and/or authentication bypasses
  • 3+ years professional and/or educational experience using packet analysis tools like Wireshark to analyze network or transport, and application layer protocols, such as IP, TCP, LDAP, TLS, RDP or SMB
  • 3+ years professional and/or educational experience with a compiled language (e.g. C, C++, Rust, Go) and/or a scripting language (e.g. Python, Ruby, Perl)
Preferred Qualifications:
  • Expertise with the structure of common file formats, such as PDF, MS Office, EXE, ELF and an ability to identify anomalies using popular file-analysis tools such as 010 Editor
  • Expert knowledge of operating system internals and familiarity with concepts such as: application memory layout, C runtime or OS-related functions, kernel vs user space functionality
  • Expertise with reverse engineering, malware analysis, and relevant tools (e.g.IDA Pro, Binary Ninja, Ghidra, radare2, x64dbg, WinDbg, OllyDbg), as well as analyzing assembly code and identifying code patterns in disassembled binaries
  • 5+ years of related industry experience in roles like: incident response, intrusion detection, forensic analysis, pentesting or red teaming, or vulnerability development
  • Experience with detection content engineering such as Snort rules language
  • Master's degree or equivalent experience Computer Science, Cyber Security, or other tech-related degree