Malware/Threat Researcher

Posted 20 Hours Ago
Hyderabad, Telangana
Entry level
Information Technology • Consulting
The Role
Threat Researcher position focused on identifying cyber threats, dissecting code, and reverse engineering malware. Responsibilities include examining malicious software, documenting attack capabilities, and writing sigma rules. Requires Bachelor's or Master's in Computer Science, experience in threat research, and knowledge of threat hunting techniques and mitigation strategies.
Summary Generated by Built In

Malware/Threat Researcher

Madhapur, Hyderabad

Full-Time position


Job Description:

We are looking for a Threat Researcher to join our Threat Research team to identify cyber threats, dissect code, and reverse engineer malware. You will operate semi-autonomously to conduct research and produce concise, written analysis and visual presentation of findings. This person will also work with our clients to provide innovative detection and eradication solutions to reduce risk to client’s networks and operations. In addition to technical expertise, to be successful in this role we’re looking for passionate self-starters who can quickly understand and deliver on company and customer requirements.

What you will do:

  • Examine malicious software to identify new techniques and exploit targets on behalf of client intelligence needs
  • Performing Threat Hunting exercises from the telemetry
  • Document attack capabilities, understand its propagation characteristics and define signatures for detection
  • Operate semi-autonomously to conduct collection, create solutions and support intelligence production per the standard operating procedures
  • Analyze malware to determine its attack techniques and targets
  • Write sigma rules for the identified malware

Requirements:

  • Bachelors or Masters in Computer Science or comparable field required.
  • Experience in the threat research field with a focus on malware analysis.
  • A proven background in advanced reverse engineering on file-based threats, exploits, and other attack techniques are desirable to be demonstrated at a moderate skill level.
  • Experience using the Pyramid of Pain in conjunction with MITRE’s ATT&CK Framework to develop threat hunting hypothesis.
  • Understanding of Advanced Persistent Threat (APT) and associated tactics, targeted attacks.
  • Strong familiarity with mitigation strategies such as Suricata, Snort and YARA signatures
  • To operate at the level required to disassemble, core principles of structured programming are required to be proficient in.
  • Expert-level familiarity with at least one major Operating System is required as a behavior- based system requires in-depth knowledge of how the host OS appears, as opposed to how the end-user sees it.
  • A good working knowledge of malware-based automation workflows and techniques.
  • Possess any basic programming and scripting skills (e.g. .NET, Perl, Java, or Python)

Top Skills

.Net
Java
Perl
Python
The Company
HQ: Chantilly, VA
163 Employees
On-site Workplace
Year Founded: 1997

What We Do

As an emerging IT solutions company, Loginsoft today brings together a great combination of expertise, efficacy and strategic thought process that aligns its business with the customer goals.

To make it simple, every day we translate our vision statement into a simple phrase - Customer Delight! And there’s so much we start adding up in terms of value, only to achieve the aforesaid. This brings a great deal of excitement in the whole process.

Over the last 15 years of our successful stint in the industry, in domains like Telecom, Cyber Security, New Media, Digital Photo Imaging, Ecommerce, we have been identified as a trusted consulting partner in various operating models viz., onsite, offshore, near shore and there are many client success stories that vouch on the engagement delight that we ensured all through. Some of our customers have been enjoying a great relationship with us for as long as 12 years. And it stands testimony to a fact that we bring commitment on board, and ensures rest, fall in its places.

Similar Jobs

ServiceNow Logo ServiceNow

Sr Staff Software Engineer - (Full Stack)

Artificial Intelligence • Cloud • HR Tech • Information Technology • Productivity • Software • Automation
Hyderabad, Telangana, IND
26000 Employees

ServiceNow Logo ServiceNow

Sr. Power BI Developer

Artificial Intelligence • Cloud • HR Tech • Information Technology • Productivity • Software • Automation
Hyderabad, Telangana, IND
26000 Employees

ServiceNow Logo ServiceNow

Mgr, Software Engrg Mgmt

Artificial Intelligence • Cloud • HR Tech • Information Technology • Productivity • Software • Automation
Hyderabad, Telangana, IND
26000 Employees

ServiceNow Logo ServiceNow

Staff Software Engineer - Java Developer

Artificial Intelligence • Cloud • HR Tech • Information Technology • Productivity • Software • Automation
Hyderabad, Telangana, IND
26000 Employees

Similar Companies Hiring

Silverfort Thumbnail
Security • Sales • Information Technology • Cybersecurity • Automation
GB
357 Employees
Jobba Trade Technologies, Inc. Thumbnail
Software • Professional Services • Productivity • Information Technology • Cloud
Chicago, IL
45 Employees
InCommodities Thumbnail
Renewable Energy • Machine Learning • Information Technology • Energy • Automation • Analytics
Austin, TX
234 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account