Expoint - all jobs in one place

המקום בו המומחים והחברות הטובות ביותר נפגשים

Limitless High-tech career opportunities - Expoint

Cisco Research Engineer 
United States, Georgia, Atlanta 
852325490

18.11.2024

Application window is expected to close by 11/17/2024

creates network and endpoint signatures that

Who you Are:

In this position you will create detection content for vulnerabilities in a variety of

reviewing technical reports, reading code diffs, or developing proofs-of-concept based

on varying degrees of background information. Once released, these protections

experience you will develop subject matter expertise in some of the technologies we

work with, act as a technical representative for NTDR at meetings with other departments

and conduct long-term advanced research and development that can be used to

If you're a tenacious learner, have an excruciating interest in detail, and want to develop

Your technical leadership skills in information security, this may be the right role for you.

Role & Responsibilities:

  • Research security threats, attacker techniques and tools, 0-day vulnerabilities and other in-depth research on novel threats
  • Write in-depth technical advisories about threats and signatures
  • Analyze malware samples and vulnerable binaries using static/dynamic analysis debuggers to Build advanced signatures and detection content for Snort, ClamAV, AMP, and other Cisco products
  • Create testbed environments to research and run exploits
  • Develop tooling that forwards the mission of the team
  • Participate in advanced research projects

Minimum Qualifications:

  • 3+ years professional and/or educational experience with analyzing, identifying, and exploiting a wide variety of vulnerability types, such as buffer overflows, integer overflows, cross-site and server-side request forgery attacks, insecure deserializations, and/or authentication bypasses
  • 3+ years professional and/or educational experience using packet analysis tools like Wireshark to analyze network or transport, and application layer protocols, such as IP, TCP, LDAP, TLS, RDP or SMB
  • 3+ years professional and/or educational experience with a compiled language (e.g. C, C++, Rust, Go) and/or a scripting language (e.g. Python, Ruby, Perl)

Preferred Qualifications:

  • Expertise with the structure of common file formats, such as PDF, MS Office, EXE, ELF and an ability to identify anomalies using popular file-analysis tools such as 010 Editor
  • Expert knowledge of operating system internals and familiarity with concepts such as: application memory layout, C runtime or OS-related functions, kernel vs user space functionality
  • Expertise with reverse engineering, malware analysis, and relevant tools (e.g.IDA Pro, Binary Ninja, Ghidra, radare2, x64dbg, WinDbg, OllyDbg), as well as analyzing assembly code and identifying code patterns in disassembled binaries
  • 5+ years of related industry experience in roles like: incident response, intrusion detection, forensic analysis, pentesting or red teaming, or vulnerability development
  • Experience with detection content engineering such as Snort rules language
  • Master's degree or equivalent experience Computer Science, Cyber Security, or other tech-related degree