Security Researcher
Socket HQ
Socket's mission is to help developers and security teams to ship faster and spend less time on security busywork. Thousands of organizations use Socket to safely discover, audit, and manage their open source code. Our customers – from Figma to Vercel – absolutely love Socket (just read their tweets to see for yourself!)
The company was founded by Feross Aboukhadijeh, who has worked in open source software for 10+ years writing software that receives more than a billion downloads per month. We have raised $65M in funding from the best angel investors, operators, and security leaders in the industry.
As a key member of the Socket Threat Research Team, you will develop and implement processes to identify and track new threats and malware campaigns, utilizing your coding, data analytics, and investigation skills to hunt, detect, and monitor threats, produce threat intelligence reports, and conduct research on emerging security trends. You will collaborate closely with other teams to ensure our customers are protected from the latest threats and present your findings and recommendations to internal stakeholders, including the executive team.
ResponsibilitiesDevelop and implement processes to identify and track new threats and malware campaigns
Work closely with other teams, such as engineering and product, to ensure that we have the best signals and that our customers are protected from the latest threats
Conduct research and analysis to identify new trends and emerging threats in the security landscape
Present findings and recommendations to internal stakeholders, including the executive team
5+ years of hands-on, in-depth knowledge and technical experience in security operations, including investigations, incident response, incident management, digital forensics, threat intelligence, threat hunting, and/or detection engineering
At least 5 years of experience with technical analysis and threat investigations
At least 5 years of experience tracking advanced threat actors and malicious campaigns
At least 5 years of experience developing innovative detection solutions and conducting open-ended research to solve real-world problems using at least one programming language, e.g. Python or JavaScript
5+ years of experience in threat intelligence, cybersecurity, or a related field
Strong understanding of malware analysis and reverse engineering techniques
Experience tracking APT (Advanced Persistent Threat) adversaries, characterizing various TTPs (Tactics, Techniques, and Procedures), capabilities, infrastructure, and campaigns over a period of at least one year
Excellent communication skills, with the ability to explain complex technical concepts to non-technical stakeholders
Strong analytical skills and experience with data analysis
Experience with open source intelligence (OSINT) and threat intelligence platforms
Master's degree in computer science, engineering, or a related field (or equivalent experience)
Pursue Excellence: We set ourselves apart by consistently delivering work of exceptional quality and distinction.
Move with urgency and focus: We prioritize swift, decisive action.
Think rigorously: We care about being right and it often takes reasoning from first principles to get there. We value alternative perspectives and have constructive discussions.
Trust and amplify: We overtrust, always assume good intent, and give specific feedback to help each other improve.
Feel a strong sense of ownership: We wear many hats and feel a strong sense of overall ownership of the company and we're non-territorial regarding our nominal domains.
Are customer obsessed: We relentlessly prioritize the needs of our customers, striving to exceed their expectations and delight them at every interaction.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Analytics APT Computer Science Data Analytics Forensics Incident response JavaScript Malware Open Source OSINT Python Reverse engineering Threat intelligence Threat Research TTPs
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.