Senior Malware Detection Researcher
Location
Bangalore | India
Job description
- You ll be part of an exceptional malware research team that will ensure we provide the best detection, protection, and visibility capabilities to our customers at any given time
- The team does it by performing in-depth analysis and research of threats and vulnerabilities while also being responsible for closing the loop through the development and deployment of signatures to millions of endpoints across the globe
- You ll be working closely with other detection teams to ensure our customers get the best security products they can
Your time will be mostly focused on research and development:
Research
- You ll research and analyze (through reverse engineering and other methods) files, TTPs, exploits, and malwares to understand how they operate and behave. The research will mostly be based on binaries and files but may also be based on other types of data sources like events and behaviors.
- Your research findings will be used for delivering new signatures and/or shared with other detection teams to improve our products detection capabilities.
- As malware research experts, you ll collaborate with many teams to help and support their work using your expertise, knowledge, or research.
Development
- You ll be responsible for developing the signatures for all of our engines that will improve our detection, protection, and visibility, reaching all of our millions of endpoints across the globe.
- You ll be responsible for the quality and accuracy of the deliverables that you ll create and be accountable for them.
- You ll create, maintain, and improve existing infrastructure and tools that are being used by the team.
You will also be encouraged to write white papers, blogs, and articles (but only if you wish to).
What experience or knowledge should you bring
- Minimum 4 years of experience in both static and dynamic malware analysis.
- Few years of experience in reverse engineering one of the following architectures: x86/x64 or ARM architecture.
- Proficiency with reverse engineering and analysis tools, such as disassemblers, compilers, and debuggers (like IDA, Ghidra, WinDBG, SysInternals, lldb, gdb).
- In-depth knowledge and experience with the malware landscape and extensive and deep understanding of OS internals (Windows experience is mandatory).
- Extensive research experience and deep knowledge of common and advanced techniques, including but not limited to lateral movement, ransomware, persistence, information leak, defense evasion, etc.
- Experience with creating production detection rules using YARA or similar engines for production use.
- Programming experience
- Write and maintain production grade code in Python
- Experience with AWS (e.g., ECS, RDS, Secret manager)
- Working with 3rd party API s
- Experience with microservices architecture
- Advantages
- Understanding of existing AVs internals.
- Familiarity with attack simulations and their TTPs
- Experience with building pipelines Jenkins CI/CD
- Experience with frontend programming (React/Angular)
Job tags
Salary