We define the industry instead of waiting for directions. We need individuals who feel comfortable in ambiguity, excited by the prospect of a challenge, and empowered by the unknown risks facing our everyday lives that are only enabled by a secure digital environment.
Key Responsibilities
- Playing a pivotal role in shaping the future of our security solutions
- Enhance the effectiveness of our product by designing cutting-edge protection components and developing sophisticated detection rules
- Research Linux OS internals, Virtualized environments, and low-level system behaviors to inform and enhance our attack prevention mechanisms
- Investigate and develop innovative methods for detecting threats and securing APIs, ensuring robust protection for modern applications and cloud-native environments
- Apply sophisticated AI and big data approaches to investigate and research large amounts of data across our clients
- Research and lead novel protection ideas to a production-grade level, serving as a subject matter expert
- Stay up to date with the latest attacker methodologies, APT campaigns, and TTPs targeting Linux systems and APIs
- Conduct static and dynamic reverse engineering of Linux malware to uncover new techniques and develop corresponding mitigation strategies
- Work closely with engineering, product management, and other research teams to translate research findings into production-grade features
Required Qualifications
- 4+ years of overall experience in cybersecurity research, with a proven track record of impactful projects
- In-depth knowledge of operating system internals, including user and kernel space
- Proficiency in programming languages like Python, C, and/or C++, with a strong understanding of system-level programming and APIs
- Strong knowledge of the cyber threat landscape, modern malware techniques, and APTs
- Hands-on experience with real-world threat hunting, big-data cyber research, incident response, or detection engineering
- Excellent problem-solving skills and a passion for cybersecurity innovation
- Ability to work independently, take initiative, and collaborate effectively within a team
Advantages
- Experience in reverse engineering, including familiarity with debugging and disassembler tools like GDB, IDA Pro, or Ghidra
- Experience with EDR/XDR products or low-level security solution development
- Knowledge of API security frameworks, vulnerabilities, and best practices
- Experience with advanced data analysis, statistics, or machine learning for security applications
- Experience in Linux kernel development or vulnerability research
- Knowledge of network protocols related to APIs (e.g., HTTP/S, REST, GraphQL)
- Experience with virtualization platforms (e.g., ESXi/vCenter)
All your information will be kept confidential according to EEO guidelines.