Job related pages:

Job vacancies

Jobs RSS Feed10 active job(s)

Job title Details Description Skills

Senior Data Scientist

Job type: Full time
Location: In company's office
Poster: Jeannette Jarvis, Intel
http://www.fortinet.com/
(re)Posted on: 2017-12-14

We are looking for a Sr. Data Scientist to work in a dynamic and exciting new position within the FortiGuard Security Strategy Group (FSSG), office of the CISO. The Data Scientist’s main responsibilities will be data mining a plethora of information from FortiGuard Labs. This includes big data - global and regional trends based on unique intelligence served up from Fortinet’s global intelligence network, as well as specific data on regional and low volume levels. Other analysis projects include support for industry relationships like the Cyber Threat Alliance. They will work directly with backend FortiGuard and FortiGuard SE teams to track and promote new discoveries based off the Data Scientist’s analysis and threat illumination. The scientist will use multiple systems to correlate data while threat hunting. This includes FortiSandbox data and other backend research systems.

The role reports into the Security Strategy organization, office of CISO. The Data Scientist will also work with our FortiGuard Tools team and Security Orchestrator in order to ingest new threat intelligence feeds for scientific analysis and evaluation, as well as export specific data sets based off filtered queries of interesting data including vertical specific information.

FortiGuard Services offer broad security solutions including antivirus, intrusion prevention, Web content filtering and anti-spam capabilities. These services help protect against threats on both application and network layers. FortiGuard Services are updated by FortiGuard Labs, which enables Fortinet to deliver a combination of multilayered security intelligence and zero-day protection from new and emerging threats. FortiGuard Labs has experts in cyber threat response and analysis worldwide.
Email me for more specifics on responsibilities.

• Hands on experience in database design/operation/maintenance, MySQL, PostgreSQL
• Big data hands on experience required (Apache Hadoop, Spark, NoSQL, etc) along with data mining
• Deep appreciation and understanding of how web service work together, include HTTP, REST, XMLRPC, JSON and preferably STIX/TAXII
• Data visualization experience (Tableau, Qlikview, etc)
• Experience with of at least one scripting language: Shell, Ruby, Perl, Python, etc
• Further development skills (C/C++) an asset
• Familiar understanding of malware and sandbox concepts
• Familiar understanding of security vulnerability and exploit lifecycle
• Networking concepts and Linux system administration skills
• Clear understanding of competitive landscape and differentiators in regard to APT defense
• Statistical and quantitative analysis (R, Matlab, SAS, Stata, etc) is a very strong asset
• Comprehensive understanding of machine learning concepts is a strong asset
• Highly motivated and responsible quick learner
• Education:
• Bachelor’s Degree in Computer Engineering, Computer Science or related field


Senior Threat Analysis Engineer - Intrusion Prevention

Job type: Full time
Location: In company's office
Poster: Parveen Vashishtha, Symantec
https://www.symantec.com/
(re)Posted on: 2017-12-01

This opening is for Pune office.

In Security Technology and Response, you will have the opportunity to be a part of a global team of security engineers, virus hunters, threat analysts, and researchers that provides the underlying security technology, content, and support for all Symantec corporate and consumer security products. The division considers not only today’s threats, but the threats of tomorrow and uses this intelligence to develop entirely new approaches to security. These technologies are being developed for every possible platform including the network infrastructure, servers, desktops, and mobile devices. The group is high-talent and high-energy, pushing new technologies that must achieve the best detection, best performance, and best user experience in the marketplace.

Responsibilities
The Threat Analysis Engineer will provide network protection for both client and server side attacks including remote code execution vulnerabilities, exploit kits, Malware (PC & Mobile), Social network scams, CMS/Web application attacks.
The engineer will be required to respond to emerging attacks and create Intrusion Prevention signatures.
The engineer will reverse engineer unknown binaries to determine their behaviour.
The engineer will create tools and scripts to aid in reverse engineering malicious threats including file format parsers and decryptors.
The role requires the ability to occasionally work under high-pressure situations.

4+ years of relevant experience.
Sound knowledge of x86 assembly and C/C++ languages.
Experience in Vulnerability research, malware analysis and reverse engineering is preferable.
The applicant should have sound knowledge of windows file system and memory management.
Debugging experience using tools such as IDA, Softice, Ollydbg is preferable.
The applicant should have solid networking background with a complete understanding of the TCP/IP protocol suite.
Knowledge in scripting languages such as Perl or Python and in reverse engineering tools and techniques is preferable.
Knowledge of web applications, CMS is preferable.
Candidate must have excellent communication skills.


Software Engineer - Email Threat Analyst

Job type: Full time
Location: In company's office
Poster: Maria Rey, VMRay GmbH
http://www.vmray.com/careers
(re)Posted on: 2017-11-21

VMRay GmbH is an early stage information security company in Bochum, Germany. We develop innovative solutions and new technologies based on the latest academic research for automated malware analysis and threat detection. Our solutions are used by government and enterprise customers around the globe. We regularly present at the top international conferences such as RSA or Blackhat. To support our growth and expand our team we are hiring a SOFTWARE ENGINEER - EMAIL THREAT ANALYSIS
(Reference: ETA- VB 11/17)

RESPONSIBILITIES
• Design and implement email component that analyzes incoming emails with malware analysis system
• Write parser that handle emails to extract potentially malicious elements (URLs, attachments, etc.)
• Write code that interacts with various analysis engines to analyze potentially malicious elements
• Obtain and maintain understanding of relevant RFCs and developments in the email area (SMTP, MIME, etc.)

We are a small, international team of 35 people. We offer modern and quiet workplaces instead of open-plan offices. Everybody arranges his working hours flexibly. At VMRay you will not be just a little cog in a big wheel. Instead, you will contribute to the conception and implementation of our products and solutions. Our technology and the problems we are solving with it are of high complexity. This is why our work is very challenging and it demands concentration and expertise. Every work day at VMRay is exciting and challenging due to a wide range of interesting customers and individual use cases.
We are not just sitting in a professional Ivory Tower but meet regularly with IT security experts from all over the world. We present our products at international conferences and give speeches at invite-only hacker workshops.

• Proven knowledge of common networking and email technologies (SMTP, TCP/IP, etc.)
• Experience in malware analysis is a plus
• Proficient with Python programming or at least one similar high-level programming language
• Fluent in verbal and written English

Please send your application documents (including reference number and salary expectations) as pdf version by email only to jobs@vmray.com!
We offer flexible working arrangements for remote work.


Software Engineer - Windows Threat Analysis

Job type: Full time
Location: In company's office
Poster: Maria Rey, VMRay GmbH
http://www.vmray.com/careers
(re)Posted on: 2017-11-21

VMRay GmbH is an early stage information security company in Bochum, Germany. We develop innovative solutions and new technologies based on the latest academic research for automated malware analysis and threat detection. Our solutions are used by government and enterprise customers around the globe. We regularly present at the top international conferences such as RSA or Blackhat. To support our growth and expand our team we are hiring a SOFTWARE ENGINEER - WINDOWS THREAT ANALYSIS
(Reference: WITA-VB 11/17)

RESPONSIBILITIES
• Analyze current Windows malware to identify typical malware behavior patterns on Windows
• Implement behavior rules that detect Windows malware both statically and dynamically
• Implement behavior rules that detect Windows malware derived therefrom
• Obtain in-depth understanding of Windows internals (API, memory system, etc.)
• Work in close collaboration with our threat analysis team to identify areas of improvements and new detection approaches

We are a small, international team of 35 people. We offer modern and quiet workplaces instead of open-plan offices. Everybody arranges his working hours flexibly. At VMRay you will not be just a little cog in a big wheel. Instead, you will contribute to the conception and implementation of our products and solutions. Our technology and the problems we are solving with it are of high complexity. This is why our work is very challenging and it demands concentration and expertise. Every work day at VMRay is exciting and challenging due to a wide range of interesting customers and individual use cases.
We are not just sitting in a professional Ivory Tower but meet regularly with IT security experts from all over the world. We present our products at international conferences and give speeches at invite-only hacker workshops.

• Strong interest in Windows internals and malware analysis
• Good knowledge of Windows API
• Experience in malware analysis is a plus
• Proficient with Python programming or at least one similar high-level programming language
• Fluent in verbal and written English

Please send your application documents (including reference number and salary expectations) as pdf version by email only to jobs@vmray.com!
We offer flexible working arrangements for remote work.


Software Engineer - Android Threat Analysis

Job type: Full time
Location: In company's office
Poster: Maria Rey, VMRay GmbH
http://www.vmray.com/careers
(re)Posted on: 2017-11-21

VMRay GmbH is an early stage information security company in Bochum, Germany. We develop innovative solutions and new technologies based on the latest academic research for automated malware analysis and threat detection. Our solutions are used by government and enterprise customers around the globe. We regularly present at the top international conferences such as RSA or Blackhat. To support our growth and expand our team we are hiring a SOFTWARE ENGINEER - ANDROID THREAT ANALYSIS (Reference: ATA-VB 11/17)#

RESPONSIBILITIES
• Analyze current Android malware to identify typical malware behavior patterns on Android
• Implement behavior rules that detect Android malware both statically and dynamically
• Implement behavior rules that detect Android malware derived therefrom
• Obtain in-depth understanding of Android internals (API, runtime environment, etc.)
• Work in close collaboration with our threat analysis team to identify areas of improvements and new detection approaches

We are a small, international team of 35 people. We offer modern and quiet workplaces instead of open-plan offices. Everybody arranges his working hours flexibly. At VMRay you will not be just a little cog in a big wheel. Instead, you will contribute to the conception and implementation of our products and solutions. Our technology and the problems we are solving with it are of high complexity. This is why our work is very challenging and it demands concentration and expertise. Every work day at VMRay is exciting and challenging due to a wide range of interesting customers and individual use cases.
We are not just sitting in a professional Ivory Tower but meet regularly with IT security experts from all over the world. We present our products at international conferences and give speeches at invite-only hacker workshops.

SKILLS & REQUIREMENTS
• Strong interest in Android internals and malware analysis
• Good knowledge of Android API
• Experience in malware analysis is a plus
• Proficient with Python programming or at least one similar high-level programming language
• Fluent in verbal and written English

Please send your application documents (including reference number and salary expectations) as pdf version by email only to jobs@vmray.com!
We offer flexible working arrangements for remote work.


Software Engineer - macOS Threat Analysis

Job type: Full time
Location: In company's office
Poster: Maria Rey, VMRay GmbH
http://www.vmray.com/careers
(re)Posted on: 2017-11-21

VMRay GmbH is an early stage information security company in Bochum, Germany. We develop innovative solutions and new technologies based on the latest academic research for automated malware analysis and threat detection. Our solutions are used by government and enterprise customers around the globe. We regularly present at the top international conferences such as RSA or Blackhat. To support our growth and expand our team we are hiring a SOFTWARE ENGINEER - macOS THREAT ANALYSIS
(Reference: MTA-VB 11/17)

RESPONSIBILITIES
• Analyze current macOS malware to identify typical malware behavior patterns on macOS
• Implement behavior rules that detect macOS malware both statically and dynamically
• Implement behavior rules that detect macOS malware derived therefrom
• Obtain in in-depth understanding of macOS internals (API, runtime environment, etc.)
• Work in close collaboration with our threat analysis team to identify areas of improvements and new detection approaches

We are a small, international team of 35 people. We offer modern and quiet workplaces instead of open-plan offices. Everybody arranges his working hours flexibly. At VMRay you will not be just a little cog in a big wheel. Instead, you will contribute to the conception and implementation of our products and solutions. Our technology and the problems we are solving with it are of high complexity. This is why our work is very challenging and it demands concentration and expertise. Every work day at VMRay is exciting and challenging due to a wide range of interesting customers and individual use cases.
We are not just sitting in a professional Ivory Tower but meet regularly with IT security experts from all over the world. We present MacOSour products at international conferences and give speeches at invite-only hacker workshops.

• Strong interest in macOS internals and malware analysis
• Good knowledge of macOS API
• Experience in malware analysis is a plus
• Proficient with Python programming or at least one similar high-level programming language
• Fluent in verbal and written English

Please send your application documents (including reference number and salary expectations) as pdf version by email only to jobs@vmray.com!
We offer flexible working arrangements for remote work.


Software Engineer - Automation and Testing

Job type: Full time
Location: In company's office
Poster: Maria Rey, VMRay GmbH
http://www.vmray.com
(re)Posted on: 2017-11-13

WHO WE ARE:

We are a small, international team of 35 people working together in Bochum, Germany. We offer modern and quiet workplaces instead of open-plan offices. Everybody arranges his working hours flexibly. At VMRay you will not be just a little cog in a big wheel. Instead, you will contribute to the conception and implementation of our products and solutions. Our technology and the problems we are solving with it are of high complexity. This is why our work is very challenging and it demands maximum concentration and expertise. Many interesting customers and individual applications reward our efforts with exciting and varied work.
We are not just sitting in a professional Ivory Tower but meet regularly with IT security experts from all over the world. We present our products at international conferences and give speeches at invite-only hacker workshops.
To support our growth and expand our team we are hiring a Software Engineer - Automation and Testing (Reference: AT-VB 11/17)

Responsiobilities
• Automate large scale malware analysis system for internal testing and data collection
• Create and extend comprehensive test plans and test cases
• Design, implement and operate automated scripts for continuous integration of tests
• Serve as first point of contact for bug handling requests
• Supervise release management process

WHAT WE OFFER:

VMRay offers a chance to be part of an early stage and fast-growing company, many different career development possibilities, a friendly and open work atmosphere, flexible working times, competitive salary and benefits, and the opportunity to work with cutting edge technology!

HOW TO APPLY:

Please send your application documents (including reference number and salary expectations) as pdf version by email only to jobs@vmray.com!

• Proven knowledge of software engineering and software development lifecycle
• Hands-on experience with automation and/or testing tools (continuous integration, etc.)
• Experience with Python programming and script automation is a plus
• Strong communication skills
• Fluent in verbal and written English


Cyber Threat Intelligence Researcher - Persian Farsi language

Job type: Full time
Location: In/Near company's office
Poster: Jason Passwaters, Intel 471
http://www.intel471.com
(re)Posted on: 2017-10-17

Intel 471 is looking for skilled cyber threat researchers at different levels who can research and track Persian speaking cyber threat actors in the criminal underground. The position is based in our soon to open office just outside of Tel Aviv, Israel. The ideal candidate would have a background in tracking cyber threat actors online and have experience in law enforcement, military or security services.

Duties & Responsibilities include:
- Monitor the Persian language cyber criminal underground where Persian speaking cyber
criminals congregate, chat and buy and sell tools.
- Research specific threat actors as part of a global team to determine the who, what, when,
where, why and how.
- Produce written reports of research findings and work collaboratively to identify
knowledge/information gaps.

Desired qualifications,​ ​skills,​ ​knowledge​ ​or​ ​experience include some or all of the following:
- Fluency in Persian Farsi and good English. English language reports would be written in this role before being released to customers after editing
- Understanding of "how" organized cybercrime works (malware usage, malware delivery, cashout/money laundering, bulletproof hosting, hacking, etc)
- Experience with cyber security, cyber threat intelligence, ethical hacking or cyber
investigations
- Understanding of common hacking tools (exploits, malware etc) and terminology
- Understanding of cyber threat research including the ability to perform behavioral analysis of
malware (with a sandbox), research a domain name, analyze passive DNS etc
- Good open source intelligence (OSINT) gathering skills
- Solid understanding of operational security aspects of conducting cyber threat
research online


Cyber Threat Intelligence Researcher - Chinese language

Job type: Full time
Location: In company's office
Poster: Jason Passwaters, Intel 471
http://www.intel471.com
(re)Posted on: 2017-10-17

Intel 471 is an actor-centric cyber threat intelligence company that targets the underground marketplace and other mediums where cyber criminals operate. We are looking for skilled cyber threat researchers who can research and track Chinese speaking threat actors operating in the criminal underground. The ideal candidate would have a background in tracking cyber threat actors online and have experience in law enforcement, military or security service.

Duties​ ​&​ ​Responsibilities include:
- Monitor the Chinese language cybercriminal underground where Chinese speaking cyber
criminals congregate, chat and buy and sell tools.
- Research specific threat actors as part of a global team to determine the who, what, when,
where, why and how.
- Produce written reports of research findings and work collaboratively to identify
knowledge/information gaps

Desired qualifications,​ ​skills,​ ​knowledge​ ​or​ ​experience include some or all of the following:
- Fluency in Chinese and good English. English language reports would be written in this role before being released to customers after editing
- Understanding of "how" organized cybercrime works (malware usage, malware delivery, cashout/money laundering, bulletproof hosting, hacking, etc)
- Experience with cyber security, cyber threat intelligence, ethical hacking or cyber
investigations
- Understanding of common hacking tools (exploits, malware etc) and terminology
- Understanding of cyber threat research including the ability to perform behavioral analysis of
malware (with a sandbox), research a domain name, analyze passive DNS etc
- Good open source intelligence (OSINT) gathering skills
- Solid understanding of operational security aspects of conducting cyber threat
research online


Research Scientist Stadd

Job type: Full time
Location: Remote - 6 wrk hrs overlap
Poster: Aditya Kapoor, Cylance Inc
https://cylance.wd1.myworkdayjobs.com/en-US/ExternalSite/job/Corp-Office---Portland-OR/Research-Scie
(re)Posted on: 2017-10-07

You'll be joining our core research team, working on state of the art static and dynamic analysis algorithms that feed into machine learning solutions. This team of researchers are experts in the OS internals, threat landscape as well as reversing assembly code and writing disassemblers, emulators and decompilers. As a part of this core team, your main responsibility will be to create research tools and prototypes. Additionally, your responsibilities will include working closely with many different teams within Cylance to understand their workflow and requirements to most effectively provide efficient solutions and algorithms.

WHAT YOU WILL DO
Develop, harden, extend and deploy solutions that further enhance Cylance’s program analysis capabilities.
Understand compiler and loader internals and create solutions that can effectively describe program capabilities.
Work closely with Threat Analysis teams within Cylance to understand the threat landscape and bring out features to feed machine learning teams.
Work closely with machine learning teams to understand how the program analysis data can be used, you are the subject matter expert for the data.
Work closely with backend and infrastructure teams to deploy your solutions in backend frameworks.
Work closely with endpoint product teams to understand the requirements of running complex algorithms at scale and efficiently on endpoint machines.
Thrive in a rapid development environment with an intense focus on quality

WHO WE ARE LOOKING FOR
3+ years of program analysis experience.
5+ years of reverse engineering experience.
5+ years of software development expeirence.
Understanding of compiler internals and program loader behavior is a plus.
Should be comfortable analyzing malware and understanding the underlying program analysis challenges.
Experience with writing unit tests and quality control in software.
Expertise in programming languages like C#, C++ as well as scripting languages like Python.
Familiarity with Amazon Web Services (AWS) technologies including EC2, S3, RDS, ELB, and Elasticache
Extensive experience with common security, source control and administration tools including Git, VPN, Secure Shell, etc.
Work independently with substantial latitude for action and decision while maintaining focus on achieving optimal outcomes as part of a collaborative development effort
Flexible and adaptable self-starter with strong relationship-building skills
Must have a passion for your work and an ability to apply that passion to both daily tasks and larger projects
Collaborative and team-oriented attitude
Effective problem-solving capabilities
Takes initiative and approaches all tasks and projects proactively
Ability to prioritize and complete multiple tasks with little to no supervision
Intellectual curiosity, humility, accountability and positive approach
Requires the ability to work independently with substantial latitude for action and decision while maintaining focus on achieving optimal outcomes as part of a collaborative development effort

« Previous 1 Next »