Software Architect, Threat Detection

Cambridge, Massachusetts, United States

ReversingLabs

Software Supply Chain Security, Threat Intelligence, and Threat Analysis Solutions to

View company page

At ReversingLabs, our application security and threat intelligence solutions have become essential to advance Cybersecurity around the globe. We're now on a journey to expand adoption and accelerate growth, funded by our recent Series B investment, to hire top talent across the security industry.

This is a game changing opportunity. We know every application threatens businesses with new supply chain risks. ReversingLabs is the only company that can dissect any binary at the speed, scale and explainability to protect the enterprise end-to-end.

Our vision is clear. Arming every company with the insight to ensure every piece of software built or bought is secure and can be trusted, and that every threat is detected. We are seeking extraordinary talent to help forge this transformational journey at ReversingLabs.

You as the Threat Detection Architect will be based in the United States (Boston-area or remote) to work with Product Management and Development teams to create appropriate architecture for file analysis products and services. Come build the cyber security solutions that will defend organizations against tomorrow's threats.

What you will do

  • Develop and implement innovative ways to detect advanced threats.
  • Document and communicate threat detection capabilities and data input requirements.
  • Understand and apply knowledge of threat intelligence life cycle.
  • Collaborate on design and integration of detection technologies.
  • Communicates architecture designs with internal (software and multi-disciplinary project team) and external (other industry partners, vendors, etc.) parties involved in our projects.
  • Defines product requirements and creates high-level architectural specifications, ensuring feasibility, functionality, and integration with existing systems/platforms.
  • Demonstrates expertise in a variety of the field's concepts, practices, patterns, and procedures.
  • Collaborates with project/product management and development teams on creating appropriate technical solutions during the project/product development plan, and report on progress and obstacles
  • Identifying business requirements and requirements of the stakeholders on the project
  • Make high-level design choices and technical standards, including software coding standards, tools, and platforms
  • Lead the architectural vision for medium-large scale project and system design using modern technology stacks with a core focus on reusability, scalability and performance at scale
  • Cooperate with a team of Backend, Front-end and Full Stack engineers in the implementation of highly-scalable, secure production systems
  • Proactively analyze and bring forth ideas for continuous improvement of the platform
  • Build mechanisms that combine multiple detection signals to create higher fidelity threat detections.

Requirements

  • Anti-malware products and technologies including containers security
  • Bachelor’s degree in Computer Science, Computer Engineering, Information Security, Technology Managementor four or more years of work experience.
  • Six or more years of relevant work experience.
  • Five or more years of Threat Intelligence experience.
  • 10+ years of experience fielding software systems as a software developer and at least 5+ years of experience designing software systems as a software architect
  • Able and drive to deliver on time, while working in a semi-autonomous environment
  • Experience in using Linux operating system
  • Extensive coding experience using object oriented programming language, such as Java or Python
  • Excellent knowledge of Relational database such as Sql Server, MySQL and PostgresQL and NoSQL database such as MongoDB.
  • Knowledge of virtualization technologies like Docker
  • Knowledge of Git or similar version control systems
  • Stay up to date with latest threats and familiar with APT and common TTPs
  • Have experience with dynamic malware analysis
  • Experience creating regex for pattern matching and YARA rules
  • Implemented security methodologies and SOC processes
  • Hands-on experience utilizing network security tools (e.g. Sourcefire, Suricata, Netwitness, o365, FireEye, etc) and SIEM/SOAR
  • Experience designing and building user interfaces with a Front-End framework such as Angular, React, Vue, etc.

Benefits

  • Competitive salary (base & bonus)
  • Health, vision, dental, disability, life insurance, 401k
  • Commuter reimbursement
  • Challenging projects in a dynamic, collaborative team
  • Great career advancement opportunities - ReversingLabs encourages internal promotion

ReversingLabs was founded in 2009 with the mission to offer the ultimate threat detection solutions. Our security products are used by some of the largest organizations in the world, including 2 of the top 3 banks, 4 of the top 6 software companies, and 2 of the top 6 insurance companies. We have been honored with numerous awards including the 2021 SC Media Trust Award for Best Threat Intelligence Technology, a 2021 Top Black Unicorn Award, a 2020 Stevie Award, and the 2017 JPMorgan Chase Hall of Innovation Award for our truly unique malware and explainable threat intelligence products. Our pioneering technologies, exceptional products, and successful customer deployments also drove investments in ReversingLabs by some of the savviest investors in the world. With offices in the United States and Croatia, ReversingLabs is poised to achieve rapid growth and deliver groundbreaking innovation in 2021.

Tags: Application security APT Computer Science Docker Full stack Java Linux Malware MongoDB MySQL Network security NoSQL PostgreSQL Python SIEM SOAR Sourcefire SQL SQL Server Threat detection Threat intelligence TTPs

Perks/benefits: 401(k) matching Career development Competitive pay Health care Insurance Startup environment

Region: North America
Country: United States
Job stats:  2  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.