Senior Threat Researcher
Area 1 Security
(Redwood City, California)We are led by security and big data experts from organizations, like the NSA, USCYBERCOM, Cisco/IronPort and FireEye who realized the need for a proactive solution to stop targeted phishing attacks. We work with some of the world’s most sophisticated security organizations in finance, retail, health care, and professional services to strengthen their cybersecurity posture.
We are seeking a highly-trained and talented senior security researcher to identify, track, and defeat sophisticated targeted cyber attackers. As a senior security researcher, your experience, thinking, and action will be the key to our success. You will identify Tactics, Techniques, and Procedures (TTPs) and analyze targeted cyber attacks in the world. You will collaborate with our team to develop new ways to present and interact with our insights. You will stop the adversary.
- Identify new threat TTP and signatures used by cyber threat actors
- Maintain up-to-date awareness of computer network exploitation and attack tools and tradecraft, threats and vulnerabilities, and respective countermeasures
- Develop and refine signatures in multiple formats (Yara, IOC, Snort, and custom signature formats)
Minimum Qualifications
- 5+ years experience in Computer Network Operations, Intrusion Analysis, Incident Response, Technical Intelligence gathering and analysis
- Experience tracking and analyzing cyber campaigns utilizing technical indicators such as Domains, IP Addresses, Emails (Subjects, From, To, etc)
- Ability to synthesize technical information and document it in a non-technical manner including through graphical and verbal depictions
- Excellent writing skills
Preferred Qualifications
- Experience with Snort, Suricata, Yara
- Experience with WireShark
- Experience with DNS, IPv4, IPv6
- BS in Computer Science
Questions
There are no answered questions, sign up or login to ask a question
- Emailing
- Network Operations
- Performing Cyber and Technical Threat Analyses
- Tracking
- DNS
- Snort
- Wireshark
- Computer Science
- Technical Skill
- Inversion of Control
- Internet Protocol Version 4
- Yara
- Incident Response
- Internet Protocol address
- Internet Protocol Version 6
- Attack Detection
- Computer Network Operations
- Intrusion Analysis
- Domains
- Suricata

Want to see jobs that are matched to you?
DreamHire recommends you jobs that fit your
skills, experiences, career goals, and more.