Threat Researcher

Bengaluru, Karnataka, India

Applications have closed

Menlo Security

The Menlo Security Enterprise Browser solution stops phishing and malware attacks on any browser and any device across your hybrid enterprise.

View company page

Menlo Security's mission is enabling the world to connect, communicate and collaborate securely without compromise. COVID-19 has made our mission all the more real. We support customers across various enterprises including Fortune 500 companies, 9/10 of the largest global banks and the Department of Defense.

The world has fundamentally changed. We are growing from 400 employees into the next phase of our journey, and we need passionate talent filled with empathy and agility. The right candidate for the job is ethical, hyper-organized, fanatical about seeing things through to completion, service-oriented, and humble enough to take feedback and coaching yet confident enough to provide feedback and coaching.

Menlo is well-funded for growth and our investors are second to none. They include Vista Equity Partners (“Vista”), General Catalyst, JPMC, American Express, HSBC, and Ericsson Ventures.

About You:

  • The candidate will play a crucial role in building the culture and the ethos of the team. 
  • Excellent communication and people skills – People are our most critical asset. Relationship building and stellar communication will take you far in our fast-moving environment 
  • Team player – This is a highly collaborative and supportive team environment
  • Self-starter – We trust our employees and have no desire to micro-manage. Seeking a proactive individual who will set and achieve high goals with the right balance of guidance and initiative. Asking questions and learning from every situation is always encouraged!

Requirements:

  • A background in cybersecurity or computer science grads with an interest in computer security
  • Proficiency with scripting languages like python
  • Strong knowledge of operating system internals and OS security mitigations
  • Strong knowledge of networking protocols
  • Deep knowledge of web threats
  • Proficiency in YARA rule writing and  threat analysis

As a Threat Researcher, you will: 

  • Conduct research that yields new algorithms, insights and prototypes that advances the state of security
  • Collaborate with cross functional stakeholders to drive the protection capabilities of the products
  • Automate repetitive tasks
  • Reverse engineer malware and exploits
  • Analyze CnC traffic and author detections to help protect our customers

MSGL-I4

Why Menlo?

Our culture is collaborative, inclusive, and fun! We have five core values: Stay Aligned, Get It Done, Customer Empathy, Think Creatively and Help Each Other Out. We believe in open communication, supporting new ideas, and sharing a mutual mindset of what we’re aiming to achieve together. There are tremendous opportunities to take initiative, implement new ideas, and have a hand in building a legacy.

All qualified applicants will receive consideration for employment without regard to race, sex, color, religion, sexual orientation, gender identity, national origin, protected veteran status, or on the basis of disability.

TO ALL AGENCIES: Please, no phone calls or emails to any employee of Menlo Security outside of the Talent organization. Menlo Security’s policy is to only accept resumes from agencies via Greenhouse (ATS). Agencies must have a valid services agreement executed and must have been assigned by the Talent team to a specific requisition. Any resume submitted outside of this process will be deemed the sole property of Menlo Security. In the event a candidate submitted outside of this policy is hired, no fee or payment will be paid.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Computer Science Exploits Malware Python Scripting

Perks/benefits: Career development

Region: Asia/Pacific
Country: India
Job stats:  20  1  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.