Threat Researcher (CyberSecurity) (CyberSecurity)
Herzliya, Tel Aviv District, Israel
Acronis
Acronis provides award-winning backup software & data protection solutions for consumers, businesses & MSPs. Protect your sensitive information!Acronis has pioneered the new IT discipline of Cyber Protection, which combines data protection and cybersecurity into a unique and integrated approach. The Acronis Cyber Protect solution is a ground-breaking approach with innovative technology that is revolutionizing the industry as we know it. Acronis is entering an exciting phase of rapid-growth and expansion, and has recently received a $250 million dollar investment from CVC Capital Partners, bringing our total valuation to more than $2.5 billion. So we are looking for more talented and hard-working individuals who are ready for a new challenge and will join us on our mission to protect the digital world!
We are looking for an experienced and driven Threat Researcher to join our CyberSecurity Team. As a Threat Researcher at the global Cyber Protection Operations team, you will be fighting against modern malicious cyber threats by reverse engineering latest threats and creating security definition for Acronis products. As an expert in cyber threats you will participate in the development of new threat detection technologies, including automation and machine learning methods.
We are looking for the next member of our “A-Team.” Are you a highly-motivated individual who thrives in a fast-paced and high-volume work environment? Do you possess a positive can-do, never-give-up attitude? Do you play nice with others on a team? Are you ready to make an impact?
We consider applications from different cities and locations across the country
RESPONSIBILITIES:
- Develop, support and tune threat detection rules
- Conduct online research of latest cyber threats and ensure it can be detected with existing technologies. Share research results in blogposts and articles
- Analyze suspicious files (executables, scripts, office documents), websites, memory dumps
- Monitor automated detection pipelines to ensure high detection accuracy
- Process customer requests to analyze suspicious files, adding latest threat detections or fixing false alarms
REQUIREMENTS:
- 3+ years experience in malware analysis (windows executables, exploits, scripts): static (e.g. IDAPro, Ghidra) and dynamic/behavioral malware analysis (e.g. OllyDBG)
- Extensive experience with threat intelligence tools: VirusTotal, Shodan, MISP/other feed collections, analysis with MITRE ATT&CK framework
- Software development experience: Python, REST APIs, SQL, Regular expressions. C/C++ would be a plus
- Understanding of common cyber attack techniques and methods, common types of malware, network protocols, OS internals (primarily Windows, but macOS and Linux would be a plus)
- Network traffic analysis (Wireshark)
- Flexibility and proven ability to learn new things/skills fast, unbeatable curiosity, analysis, critical thinking, and problem-solving skills
- Good reading and writing English skills
Acronis is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, color, marital status, national origin, physical or mental disability, medical condition, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, gender identity or expression, or any other characteristic protected by applicable laws, regulations and ordinances
#LI-MC1
Tags: APIs Automation C C++ Exploits Ghidra Linux Machine Learning MacOS Malware MISP MITRE ATT&CK OllyDbg Python Reverse engineering SHODAN SQL Threat detection Threat intelligence VirusTotal Windows
Perks/benefits: Career development
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Staff Security Engineer jobs
- Open Information Security Specialist jobs
- Open Senior Security Analyst jobs
- Open Security Operations Engineer jobs
- Open Senior Cyber Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Senior Information Security Analyst jobs
- Open Product Security Engineer jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Cybersecurity Analyst jobs
- Open Cyber Security Specialist jobs
- Open Principal Security Engineer jobs
- Open Cybersecurity Consultant jobs
- Open Consultant SOC / CERT H/F jobs
- Open Senior Information Security Engineer jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Specialist jobs
- Open Security Specialist jobs
- Open Chief Information Security Officer jobs
- Open Security Researcher jobs
- Open Senior Penetration Tester jobs
- Open Senior Security Architect jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Senior Cyber Security Specialist jobs
- Open Information System Security Officer (ISSO) jobs
- Open Clearance-related jobs
- Open ISO 27001-related jobs
- Open Windows-related jobs
- Open Application security-related jobs
- Open Network security-related jobs
- Open CISM-related jobs
- Open Pentesting-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open Analytics-related jobs
- Open SaaS-related jobs
- Open IAM-related jobs
- Open CISA-related jobs
- Open Threat intelligence-related jobs
- Open Security assessment-related jobs
- Open DevOps-related jobs
- Open Java-related jobs
- Open Kubernetes-related jobs
- Open EDR-related jobs
- Open Malware-related jobs
- Open APIs-related jobs
- Open IDS-related jobs
- Open Security Clearance-related jobs
- Open DevSecOps-related jobs
- Open CI/CD-related jobs