Senior Threat Researcher

Cylance   •  

Austin, TX

Less than 5 years

Posted 183 days ago

This job is no longer available.


  • Over three years of background experience in either network forensic analysis, malware/threat analysis, or other technical security-related roles (consulting/engineering)
  • Advanced understanding of Windows Portable Executable file anatomy
  • Installation, use, and configuration of virtualization software, including virtual networking and host isolation
  • Comprehensive understanding of assembly language and multi-platform reverse engineering proficiency in both x86 and x64 architectures
  • Current knowledge of tools, tactics and procedures associated with active attack groups
  • Experience developing and/or auditing one or more of C, C++, or Objective-C
  • Programming experience (C, C++, or C#) or scripting experience with Python, Ruby, Perl, Javascript, or other scripting languages
  • Strong understanding of current exploitation techniques across multiple platforms and the ability to analyze malicious Javascript
  • Prior experience researching, discovering, and tracking adversarial and advanced persistent threats
  • Proficiency in network traffic analysis
  • System administration experience, including familiarity with command-line interfaces and database administration
  • Familiarity with crash analysis and runtime instrumentation (IDA, GDB, ImmDbg, Olly, WinDbg, PINtool, etc.)
  • Ability to effectively communicate analytic findings both verbally and in polished written reports
  • Flexible and adaptable self-starter with strong relationship-building skills
  • Must have a passion for your work and an ability to apply that passion to both daily tasks and larger projects
  • Collaborative and team-oriented attitude
  • Effective problem-solving capabilities
  • Takes initiative and approaches all tasks and projects proactively
  • Ability to prioritize and complete multiple tasks with little to no supervision
  • Intellectual curiosity, humility, accountability and positive approach
  • Requires the ability to work independently with substantial latitude for action and decision while maintaining focus on achieving optimal outcomes as part of a collaborative development effort


  • Professional development experience in Python, C languages
  • Professional experience in exploit development, and pentesting
  • Use of automated analysis sandbox tools
  • Familiarity with anti-virtualization and anti-analysis techniques
  • Ability to patch malware to execute in testing environment
  • Blind protocol analysis and protocol reversing/protocol tools development
  • Professional consulting experience
  • GREM/CREA Certification or other malware analysis certifications
  • OSCP/OSCE Certification or other offensive security ceritificaitons

  • R00974