Staff Security Research Engineer

14 Minutes ago • All levels
Cyber Security

Job Description

This highly technical Staff Security Research Engineer role at Proofpoint's Threat Research team directly impacts customer protection. The role involves tracking threat actors, malware, phishing, and TTPs to develop static and dynamic signatures for threat detection and prevention. You will analyze email messages, malicious documents, and URLs, applying critical thinking to mitigate threats on a massive scale and continuously improve detection capabilities.
Good To Have:
  • Interest in learning sandbox engineering concepts and contributing ideas to extend capabilities a plus
  • Interest in creating synthetic malicious samples to test capabilities a plus
Must Have:
  • Stay abreast of a constantly evolving threat landscape including the credential phishing landscape
  • Analyse malware, malicious documents, and malicious URLs provided by internal and external sources
  • Conduct in-depth analysis of email messages to detect and classify threats such as business email compromise (BEC), phishing, and other malicious campaigns
  • Apply critical thinking skills to identify the most efficient and effective way to mitigate the analysed threat
  • Develop, test, and deploy appropriate static and/or behavioural signatures to mitigate the analysed threat
  • Identify, prioritize, and fill coverage gaps for relevant threats to minimize customer impact
  • Respond to customer FN/FP escalations that cannot be addressed by customer support
  • Work with engineering teams, defining requirements, for the continuous improvement of critical detection capabilities
  • A passion for threat research and a well-rounded yet deep understanding of the security threat landscape
  • Demonstrable understanding of the malware and credential phishing landscape, TTPs, and experience overcoming bypass techniques
  • Experience proactively identifying, responding to, and defending against malware and credential phishing threats in production environments
  • Familiarity with browser internals and the Document Object Model
  • Broad and demonstrable understanding of document formats commonly used for malicious purposes (e.g. OLE, CDFv2, PDF, OpenOffice, RTF)
  • Experience parsing and analysing malicious documents
  • Experience leveraging sandbox environments as an analysis tool
  • Critical thinking: Able to develop high quality detection signatures based on analysis of malicious behaviour
  • Experience creating YARA and/or ClamAV signatures used in production environments
  • Regular expression wizardry
  • Intermediate-level Python experience
  • Willing and able to work independently and collaboratively as part of a distributed team of industry-leading security researchers
  • A hard-working, self-directed team player fully capable of working remotely
Perks:
  • Competitive compensation
  • Comprehensive benefits
  • Learning & Development: We are committed to the growth and development of our team members, offering a range of programs including leadership and professional development workshops, stretch project assignments, and mentoring opportunities to help employees reach their full potential.
  • Flexible work environment: [Remote options, hybrid schedules, flexible hours, etc.]
  • Annual wellness and community outreach days
  • Always on recognition for your contributions
  • Global collaboration and networking opportunities

Add these skills to join the top 1% applicants for this job

problem-solving
team-player
game-texts
python

The role

This highly technical role has a direct and real-time impact on protecting customers.

As a Senior Security Research Engineer on the Threat Research team, you’ll be part of an amazing, collaborative, industry-leading team focused on tracking threat actors, malware, phishing, and TTPs to develop static and dynamic (behavioural) signatures that detect and prevent threats on a massive scale.

If you enjoy keeping abreast of and analysing attacker techniques, malware and phishing campaigns, and using that knowledge to counteract those threats on a broad scale, then this is the role for you.

This role has an absolute and direct impact on the efficacy of products, the quality of intelligence, and the protection of customers.

Your day-to-day

  • Stay abreast of a constantly evolving threat landscape including the credential phishing landscape
  • Analyse malware, malicious documents, and malicious URLs provided by internal and external sources
  • Conduct in-depth analysis of email messages to detect and classify threats such as business email compromise (BEC), phishing, and other malicious campaigns.
  • Apply critical thinking skills to identify the most efficient and effective way to mitigate the analysed threat
  • Develop, test, and deploy appropriate static and/or behavioural signatures to mitigate the analysed threat
  • Identify, prioritize, and fill coverage gaps for relevant threats to minimize customer impact
  • Respond to customer FN/FP escalations that cannot be addressed by customer support
  • Work effectively as part of a remote team using chat, video chat and conference calls
  • Work with engineering teams, defining requirements, for the continuous improvement of critical detection capabilities

What you bring to the team

  • A passion for threat research and a well-rounded yet deep understanding of the security threat landscape Demonstrable understanding of the malware and credential phishing landscape, TTPs, and experience overcoming bypass techniques
  • Experience proactively identifying, responding to, and defending against malware and credential phishing threats in production environments
  • Familiarity with browser internals and the Document Object Model Broad and demonstrable understanding of document formats commonly used for malicious purposes (e.g. OLE, CDFv2, PDF, OpenOffice, RTF)
  • Experience parsing and analysing malicious documents Experience leveraging sandbox environments as an analysis tool
  • Critical thinking: Able to develop high quality detection signatures based on analysis of malicious behaviour
  • Experience creating YARA and/or ClamAV signatures used in production environments
  • Regular expression wizardry Intermediate-level Python experience Interest in learning sandbox engineering concepts and contributing ideas to extend capabilities a plus Interest in creating synthetic malicious samples to test capabilities a plus
  • Willing and able to work independently and collaboratively as part of a distributed team of industry-leading security researchers A hard-working, self-directed team player fully capable of working remotely

Set alerts for more jobs like Staff Security Research Engineer
Set alerts for new jobs by Proofpoint
Set alerts for new Cyber Security jobs in United Kingdom
Set alerts for new jobs in United Kingdom
Set alerts for Cyber Security (Remote) jobs

Contact Us
hello@outscal.com
Made in INDIA 💛💙