Senior Threat Researcher
Bengaluru, Karnataka
Cyderes
Cyderes delivers proactive managed cybersecurity services, identity, and professional services to help enterprises stay ahead of threats and gain control of cyber risk. Be everyday ready.
Cyderes (Cyber Defense and Response) is a pure-play, full life-cycle cybersecurity services provider with award-winning managed security services, identity and access management, and professional services designed to manage the cybersecurity risks of enterprise clients. We specialize in multi-technology, complex environments with the in speed and agility needed to tackle the most advanced cyber threats. We leverage our global scale and decades of experience to accelerate our clients’ cyber outcomes through a full lifecycle of cybersecurity services. We are a global company with operating centers in the United States, Canada, the United Kingdom, and India.
About the Job:Cyderes’ Threat Fusion Team is looking for a highly skilled threat researcher to conduct malware research in support of global security operations. This team will support multiple groups within the company, to include Threat Intelligence, Threat Hunting, DFIR, and MDR, with expert malware research services. The malware research team will also be responsible for tracking malware families, creating and updating kill chains, reverse engineering, and tracking nation-state threat actor activity. In addition, they will create hunting queries and conduct hunting operations in client environments. Other duties for this team include:
Note: This job posting is intended for direct applicants only. We request that outside recruiters do not contact us regarding this position.
About the Job:Cyderes’ Threat Fusion Team is looking for a highly skilled threat researcher to conduct malware research in support of global security operations. This team will support multiple groups within the company, to include Threat Intelligence, Threat Hunting, DFIR, and MDR, with expert malware research services. The malware research team will also be responsible for tracking malware families, creating and updating kill chains, reverse engineering, and tracking nation-state threat actor activity. In addition, they will create hunting queries and conduct hunting operations in client environments. Other duties for this team include:
Responsibilities:
- Function as a centralized malware reversing team for the company's needs. (support DFIR, Hunters, MDR, etc.)
- Track threat actors and campaigns via malware research, code reuse, infrastructure usage, general threat profiling.
- Create, test, verify efficacy for intel-based threat hunting queries for emerging threats.
- Create a library of actionable threat briefing that include quick analysis, context, and investigative steps for emerging threats (malware families, zero days, major campaigns) (2-5 page quick hit publications).
- Create white papers with in-depth threat analysis when threat discoveries warrant deeper dive reporting.
- Create profiles, kill chains, preferred targets, regions, etc for major threat actors / ransomware families
- This team will actively conduct global threat hunting for emerging threats.
Requirements:
- 4+ years of hands-on experience in Malware Reverse Engineering
- Proficiency in researching threat actors and producing intelligence reports
- Malware reverse engineering expertise across Windows, Linux, and OSX samples. Tools should include IDAPRO, OLLYDBG, and similar.
- OSINT knowledge, using popular sources to expand understanding of threat groups.
- Advanced VirusTotal research skills, to include retro hunting and API connections.
- Knowledge of current ransomware groups and other malware families, to include TTP’s, code structure, and typical kill chains.
- Knowledge of DarkWeb research and investigation using popular tool sets.
- Advanced investigative skills using popular EDR Tools, such as CrowdStrike, SentinelOne, and Microsoft Defender. Able to craft complex queries in their respective query languages.
- Skilled in querying and reviewing data in popular SIEMS, such as Splunk and Google Chronicle.
- Skilled in writing concise, compelling, and actionable intelligence reports in English.
- Able to lead intelligence briefings with customers in English.
Note: This job posting is intended for direct applicants only. We request that outside recruiters do not contact us regarding this position.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
6
2
0
Categories:
Research Jobs
Threat Intel Jobs
Tags: APIs CrowdStrike Cyber defense DFIR EDR Forensics IAM Incident response Linux Malware OllyDbg OSINT Reverse engineering SIEM Splunk Threat intelligence VirusTotal Windows
Region:
Asia/Pacific
Country:
India
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Security Operations Engineer jobsSenior Cybersecurity Engineer jobsSenior Security Analyst jobsSenior Cloud Security Engineer jobsSystems Administrator jobsIT Security Analyst jobsCyber Security Specialist jobsSenior Information Security Analyst jobsInformation Security Manager jobsSenior Network Security Engineer jobsSecurity Consultant jobsSenior Product Security Engineer jobsSenior Information Security Engineer jobsInformation Systems Security Engineer jobsChief Information Security Officer jobsSecurity Specialist jobsInformation System Security Officer (ISSO) jobsSenior Cyber Security Engineer jobsIT Security Engineer jobsSenior IT Auditor jobsCyber Threat Intelligence Analyst jobsCybersecurity Specialist jobsSecurity Operations Analyst jobsSenior Software Engineer jobsNetwork Engineer jobs
Java jobsTS/SCI jobsSecurity assessment jobsEDR jobsEncryption jobsSplunk jobsSDLC jobsThreat detection jobsMalware jobsFinance jobsIDS jobsTerraform jobsRMF jobsIPS jobsTop Secret jobsForensics jobsSQL jobsSOC 2 jobsCompTIA jobsDocker jobsActive Directory jobsOWASP jobsClearance Required jobsITIL jobsIntrusion detection jobs