Being the cybersecurity partner of choice, protecting our digital way of life.
Your Impact
- Track and monitor the security threat landscape, using various information sources to raise flags for gaps and to improve security coverage
- Reverse engineer and analyze malware and hack tools used by various threat actors
- Discovering new behavioral anomalies and TTPs used by threat actors and assisting in creating relevant mitigations
- Write threat intelligence reports and blogs (Technical English fluency - is a must!)
- Present your research in internal and international security conferences
- Work closely with other domestic and international research teams to collect and disseminate threat intelligence and improve the overall product’s security coverage
Your Experience
- 5+ years of experience as a threat researcher, intelligence analyst, malware analyst, reverse engineer, threat hunter or incident responder/DFIR
- Familiarity with advanced topics and experience in malware analysis, threat hunting, long-term threat tracking, and attribution
- Intimate knowledge and understanding of attack methods and TTPs over endpoints and enterprise solutions (EDR/XDR/XIAM)
- Good command of networking and authentication protocols, architecture and security concepts
- Coding experience with Python, including writing scripts for IDA Pro
- Experience using BigQuery or other SQL-based querying languages
- Reverse engineering macOS and Linux malware experience - advantage
- Presented research in international security conferences - advantage
- Experience using git - advantage
- High proficiency in English, both verbal and written - a must
- Proven experience in technical writing, including a record of published security blogs - a must
- Ability to work in a dynamic, fast-moving, and demanding environment
- Independent and team player, critical thinker
- Ability to summarize complex data and explain it in simple terms that can be understood by both technical and less-technical audiences
All your information will be kept confidential according to EEO guidelines.
All your information will be kept confidential according to EEO guidelines.