Security Joes is a cyber security firm specialized in incident response and managed detection & response services, sided with a unique and proprietary enrichment technology hidden in its chambers.
The company was established by world-renowned security researchers to first and foremost generate resilience against highly complex cyberwarfare incidents.
Based out of Israel, we are now a house for best-of-breed incident responders and threat researchers from all over the world!
Joining us will give you the opportunity to work with high-end clients in some of the most interesting industries out there.
While our entire staff is working from home, we are all close and get the chance to meet at company events, security conferences and engagements with clients around the world.
About the Role: As a Senior Threat Researcher you will be reporting directly to the Threat Research Manager.
You'll be joining a team in your time-zone and get responsibility for receiving live attacks from our clients' security technologies, respond rapidly through our built-in automations, gain visibility and collect vital threat indicators to investigate and later attribute the attack to sometimes state-sponsored threat actors and their specific malware toolkits.
Within our global team, you will have complete flexibility to create new initiative and add your input to company-wide procedures, methodologies and knowledge.
With that said, you'll also be expected to add your investigations to our threat intelligence reports library, ingest our technology with your findings and act as a subject matter expert for malware analysis education & training internally.
Additionally you will: Conduct security product due-diligence when onboarding new client technologies Execute threat hunting activities and build scripts to maintain our arsenals Support our internal technologies on Github Directly interact with our clients and their security teams Facilitate complex investigations and be responsible for the deliverables, including developing protection rules and actions Work closely with the marketing team to promote our brand, release publications, speak in conferences and conduct workshops.
Continuously improve our telemetry, and enrich our threat research capabilities.
Requirements: At least 5 years hands-on experience in malware research and incident response.
Expert with practical Reverse engineering.
Up-to-date SANS GIAC certifications / Zero2Auto or equivalent, in the topic of advanced malware analysis and incident response Strong programming skills and code management - Python over Git/Github/etc Strong knowledge with detection rules and filters (Yara/Sigma/etc) An active member in the cyber research community, who contributes and shares knowledge and maintains an active social account or blog is a big advantage.
Outstanding communication skills in English, both written and verbal.
Experience with delivering hands-on training (malware analysis, incident response, reverse engineering Ability to present on-stage technical concepts in a clear way to different audiences.
Presenting at BlackHat / DefCon / RECON/ or equivalent in your region, in the past, is an advantage.
B.Sc.
in Computer Science is an advantage