Required/Minimum Qualifications
- 3+ years experience in software development lifecycle, large-scale computing, modeling, cybersecurity, and/or anomaly detection
OR Bachelor's Degree in Statistics, Mathematics, Computer Science or related field
- 2+ years of experience in reverse engineering malware that are associated with APT or financially motivated groups
Additional or Preferred Qualifications
- 4+ years experience in software development lifecycle, large-scale computing, modeling, cyber-security, and/or anomaly detection
- o OR Master's Degree in Statistics, Mathematics, Computer Science or related field
- 2+ years experience analyzing malicious desktop, mobile and web applications developed in common programming languages such as x86/x86-64 Assembly, ARM, C, C++, C#, Visual Basic, PowerShell, Ruby, Python, ActionScript, ASP, Java, JavaScript, HTML, etc.
- 2+ years experience using commercial and open-source malware analysis tools and platforms such as debuggers, disassemblers, decompilers, sandboxes and virtualization solutions.
- Knowledge of Windows Operating Systems (OS) internals and Windows API Demonstrated capability to coherently present potentially sensitive threat intelligence to a wide variety of audiences in public and private settings.
- Demonstrated interpersonal skills (adaptability, inclusiveness, optimism, curiosity, empathy, courage, respect) which support the development of high functioning teams.
- Tactical software development experience in support of automation, triage and analysis of datasets, information and artifacts associated with APT related malware and campaign activity.
- Familiarity with legacy and modern software and system protection mythologies and technologies Demonstrated experience working with SQL-based databases and Big Data solutions.
- Experience working closely with threat intelligence analysts to understand their workflow and analytic problems and turning those into large-scale analytics.
- Demonstrated experience analyzing packed and obfuscated programs, scripts, and shellcode.
- Demonstrated experience identifying and subverting anti-disassembly, anti-decompilation, anti-debugging and anti-virtualization/emulation and anti-forensic techniques and methodologies
- Experience with malware used in conjunction with ransomware is highly preferred.
Security Research IC3 - The typical base pay range for this role across Canada is CAD $83,600 - CAD $159,600 per year.
Find additional pay information here: