Problem Solvers. Proactive Protectors. Relentless Allies.
Ready to join us? Let's get started.
This role will contribute to analytical content based upon multiple types of cyber threat research. As a Sr. Cybersecurity Researcher, you will join a world-class threat research team focused on enterprise cybersecurity; particularly offensive cyber techniques, business email compromise (BEC), malware defense and Advanced Persistent Threat (APT) command and control infrastructure (C&C).
WHAT YOU'LL DO
Design and implement new features and functionality Work with the Product Managers to outline features for the product roadmapsWork with different teams and products to understand requirements and design solutionsIdentify and evaluate new technologies for implementationConsult with end user to prototype, refine, test, and debug programs to meet needs Work within Research & Development to improve processes and best practices Innovate process solutionsCreate or align best practicesMonitoring for and sometimes enforcement of standards Serve as a technical expert on threat intelligence projectsParticipate in full project life cycle including requirements analysis and designWrite technical specifications based on conceptual design and stated business requirementsAnalyze project code to find causes of errors and revise programs as neededWork without supervision on highly complex projects.Actively participate or sometimes take the lead in Agile ceremoniesActively research various types of cyber-attacks using active defense techniques, data analysis, and open-source intelligence gatheringCreate analytical products in the form of intelligence alerts, threat reports, whitepapers, and blog posts covering the cyber threat landscape created by team membersAnalyze threat actor communications to understand new tactics, techniques, and procedures (TTPs)Engage with threat actors using active defense techniques to collect intelligenceConduct data analysis to identify notable phishing and APT trendsCommunicate analytical findings to various audiences through in-person and virtual presentationsExtensive latitude for independent judgmentAssist and mentor less experienced peersDevelop and deploy SNORT and Suricata rules to detect the latest cyber threats at the network level.Design and maintain the IDS content release pipeline.Develop new threat intelligence pipelines to improve our detection efficacy.Other duties as assigned QUALIFICATIONS
10+ years in operational threat research or intelligence analysisProven previous experience in the Cybersecurity Researcher III roleAbility to digest raw intelligence and produce well-written analytical productsUnderstanding of social engineering techniques and phishing threats.Knowledge of various types of cyber threats, threat groups, attack vectors, attacker tactics, and countermeasures.Good communication skills both verbal and writtenStrong analytical reasoning, problem solving, and decision-making skillsAbility to work independently and effectively as part of a teamOutstanding data analysis skills and experience with data analysis tools.Assist as a project leader or as a subject matter expert.Working knowledge of the Agile Project development methodology and be able to implement those methodologies in active projectsProven experience and knowledge of the relevant programming language requirements for this role and the ability to share that knowledge with team members Preferred Qualifications:
Experience in the intelligence community or cybersecurity product developmentCoding experience - either in an educational or professional environment.Experience with databases and writing SQL queriesExperience with APIs and/or basic scripting languagesExperience analyzing email-based threats, particularly phishing & business email compromise attacks ID:2981