Senior Security Researcher - Threat Hunting

Remote - Madrid Cmty, Spain


Zscaler is the leader in cybersecurity and zero trust digital transformation. Transform your IT and security needs with the best CASB and SASE solutions.

View company page

About Zscaler

Zscaler (NASDAQ: ZS) accelerates digital transformation so that customers can be more agile, efficient, resilient, and secure. The Zscaler Zero Trust Exchange is the company’s cloud-native platform that protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location. 

With more than 10 years of experience developing, operating, and scaling the cloud, Zscaler serves thousands of enterprise customers around the world, including 450 of the Forbes Global 2000 organizations. In addition to protecting customers from damaging threats, such as ransomware and data exfiltration, it helps them slash costs, reduce complexity, and improve the user experience by eliminating stacks of latency-creating gateway appliances. 

Zscaler was founded in 2007 with a mission to make the cloud a safe place to do business and a more enjoyable experience for enterprise users. Zscaler’s purpose-built security platform puts a company’s defenses and controls where the connections occur—the internet—so that every connection is fast and secure, no matter how or where users connect or where their applications and workloads reside.


***This role can be worked remotely from any country within EMEA where Zscaler has a legal entity***

The Senior Security Researcher - Threat Hunting will report to the Director Managed Threat Hunting. The Security Researcher will be primarily responsible for proactively hunting threats, blue teaming, performing exploit and vulnerability research, all in order to find and close holes exploited by threat actors.

ThreatLabZ is the security research arm of Zscaler. This world-class team is responsible for hunting new threats and ensuring that the 15 million users on the global Zscaler platform are always protected. In addition to malware research and behavioral analysis, team members are involved in the research and development of new prototype modules for advanced threat protection on the Zscaler platform, and regularly conduct internal security audits to ensure that Zscaler products and infrastructure meet security compliance standards. ThreatLabZ regularly publishes in-depth analyses of new and emerging threats on its portal,


Responsibilities/What You’ll Do:

  • Perform event correlation analysis using data gathered from a variety of sources to detect and confirm attacks
  • Provide timely detection and alerting of possible attacks and intrusions
  • Analyze activity to identify weaknesses that were exploited and perform root cause analysis
  • Proactively hunting threats, blue teaming, performing exploit and vulnerability research, all in order to find and close holes exploited by bad actors.
  • Malware, exploits and infection chain (kill-chain) research to ensure detection
  • Write blog posts and whitepapers related to advanced threat analysis
  • Write threat hunting signatures to discover new instances in Zscaler cloud and OSINT
  • Work on internal automation projects and build tools to aid in threat hunting activities
  • Continuously review security bulletins and related news; stay apprised of current threats and trends.


  • have 5+ years of hands-on experience in a Security Information and Event Management tool, such as Splunk, Elasticsearch.
  • Must have Hands-on Threat Hunting experience
  • Strong understanding of tools, tactics and procedures (TTPs) of threats actors (eCrime/APT)
  • Experience in Incident Analysis and Response using industry standard frameworks such as MITRE ATT&CK and the Cyber Kill Chain
  • Experience with Malware analysis - Dynamic & Static, Tools like – IDA Pro, Ollydbg, Wireshark etc.
  • Must be able to validate findings, perform root cause analysis, and deliver recommendations for fixes.
  • Strong scripting and automation skills are must (Python preferable)
  • Must have excellent reporting and analytical skills.
  • Strong understanding of web protocols and web application security
  • Experience writing IDS/IPS, YARA signatures



By applying for this role, you adhere to applicable laws, regulations, and Zscaler policies, including those related to security and privacy standards and guidelines.

Zscaler is proud to be an equal opportunity and affirmative action employer. We celebrate diversity and are committed to creating an inclusive environment for all of our employees. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex (including pregnancy or related medical conditions), age, national origin, sexual orientation, gender identity or expression, genetic information, disability status, protected veteran status or any other characteristics protected by federal, state, or local laws.

See more information by clicking on the Know Your Rights: Workplace Discrimination is Illegal link.

Pay Transparency

Zscaler complies with all applicable federal, state, and local pay transparency rules. For additional information about the federal requirements, click here.

Zscaler is committed to providing reasonable support (called accommodations or adjustments) in our recruiting processes for candidates who are differently abled, have long term conditions, mental health conditions or sincerely held religious beliefs, or who are neurodivergent or require pregnancy-related support.

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Agile Application security APT Audits Automation Cloud Compliance Cyber Kill Chain Elasticsearch Exploit Exploits IDS IPS Malware MITRE ATT&CK OllyDbg OSINT Privacy Python Scripting Splunk TTPs Zero Trust

Regions: Remote/Anywhere Europe
Country: Spain
Job stats:  43  6  0

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.