drjobs Staff Threat Researcher

Staff Threat Researcher

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Rome - Italy

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

What are we looking for

We are seeking a highly motivated and skilled individual to join our team as a Staff Threat (Intelligence) Researcher. The ideal new colleague should have a solid background in cybercrime investigation/threat research - incl. especially Linux and/or Cloud and malware analysis. You will be responsible for conducting in-depth research and analysis of emerging and existing threats provide actionable intelligence for detection and will leverage your deep understanding of the tactics techniques and procedures used by ransomware operators and their ecosystem.

What Youll Do

  • Lead threat intelligence initiatives to proactively research analyze and assess emerging cyber threats including ransomware groups financially motivated actors with a focus on developing detection strategies.
  • Perform in-depth technical threat analysis including malware reverse engineering (static/dynamic) campaign tracking and infrastructure profiling to inform and drive detection logic in endpoint detection and response (EDR) platforms.
  • Develop high-fidelity detection logic (YARA platform rules etc) based on actionable intelligence derived from malware capabilities actor TTPs and behavioral patterns observed in telemetry and forensic artifacts.
  • Design and implement threat hunting strategies to proactively discover malicious activity unearth novel attack patterns and surface IOCs and BOIs across diverse environments.
  • Continuously curate and maintain a threat intelligence knowledge base including actor profiles toolsets infrastructure usage TTPs and affiliations with a special focus on tracking ransomware and their evolving ecosystems.
  • Monitor adversary infrastructure (C2s exploit servers) and develop automated methods to fingerprint and track infrastructure reuse across campaigns.
  • Collaborate with detection engineers to align threat research with detection coverage gaps
  • Produce actionable intelligence reports and detection recommendations for internal stakeholders including concise executive briefings and deep technical analysis for detection engineering and response teams.
  • Stay ahead of the curve on malware trends evasive techniques and novel TTPs and map findings to threat models (e.g. MITRE ATT&CK Diamond Model) to maintain contextual awareness and detection depth.
  • Mentor and guide detection engineers promoting a culture of continuous learning collaboration and threat-informed defense.

What experience or knowledge should you bring

  • Expertise in malware analysis (both static and dynamic) reverse engineering unpacking and deobfuscation using tools like IDA Pro Ghidra x64dbg and behavioral sandboxes (Cuckoo CAPE etc.).
  • Strong understanding of endpoint security technologies especially EDR platforms and the internal workings of how detection signals are generated and triaged.
  • Deep knowledge of operating system internals (Windows Linux) including memory management process/thread architecture registry and system calls. Familiarity with Extended Berkeley Packet Filter (eBPF) and container security is highly valued.
  • Knowledge of cloud threat landscape and threats and attacks targeting Linux containers and K8s.
  • Experience with cloud security research/ cloud threat hunting or IR/ cloud pentesting or redteaming; and with cloud threat detection and cloud-native telemetry (AWS Azure GCP).
  • Proficient in threat intelligence frameworks and methodologies including the Diamond Model MITRE ATT&CK Kill Chain and mapping TTPs to coverage and detection gaps.
  • Strong data analysis and pattern recognition skills able to sift through telemetry logs and artifacts to derive meaningful insights that drive detection hypotheses and logic.
  • Skilled in programming/scripting for automation analysis and detection logic generation (mostly Python)
  • Experience building and maintaining threat hunting playbooks leveraging endpoint telemetry behavior analytics and threat intelligence to operationalize continuous threat detection.
  • Comprehensive understanding of threat actor behaviors intrusion sets and motivations and their tooling/ecosystem.

Nice-to-Have Skills and Qualifications:

  • Relevant certifications such as GIAC GREM CREA CMA OSCE3 or RECA.
  • Familiarity with CTI enrichment platforms and tooling such as MISP ThreatConnect or commercial TIPs.
  • Practical experience in building detection pipelines integrating threat intelligence with SIEM/EDR platforms.
  • Contributions to open-source tools YARA rulesets or CTI repositories.
  • Authored some blogs

Why Us

Because you will meet extraordinary challenges facing the newest attacks and tech obstacles and overcoming them. You will work with the very BEST in the industry in a flexible and independent environment. You will influence the design of a disruptive product that will shape the security industry of tomorrow.

What we offer you

  • Flexible working hoursthis is a 100% remote role based within Italy; we provide optional membership in major coworking chains
    • Currently for this role in Italy we are able to consider onlycandidates that are already eligible to work in the EU at the time of applying
    • Optionally for those willing to relocate to the Czech Republic relocation assistance is available for any candidates that are already eligible to work in the EUat the time of applying
  • Generous employee stock plan in the form of RSUs (restricted stock units) grantnot options; 4 years vesting with 1 year cliff and then quarterly stock refresh yearly
  • Yearly bonus depending on the performance of the company paid out in 2 installments
  • Quadro benefits - Private Medical Life Insurance Accident Insurance Study funds and Healthcare benefits
  • Flexible time off (up to 30 paid days off per annum!)
  • Global gender-neutral Parental Leave (16 weeks beyond the leave provided by the local laws) & Grandparent Leave
  • Volunteering paid day off & Additional paid Company holidays off (e.g. 4 days in 2022)
  • Global Employee Assistance Program (confidential counseling related to both personal and work life matters)
  • Udemy Business platform for Hard/Soft skills Training internal mentoring MentorOne & Support for your further educational activities/trainings
  • Above-standard referral bonus

& Aditional country-specific benefits to Italy


Required Experience:

Staff IC

Employment Type

Full-Time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.