Match score not available

Sr Technical Threat Researcher

Remote: 
Full Remote
Contract: 
Work from: 

Offer summary

Qualifications:

At least 5 years of experience in technical analysis of cyber threats or offensive security., Proficiency in malicious code analysis and creating detection rules using YARA, Sigma, and Suricata., Strong writing skills in both English and French, with experience in technical documentation., Familiarity with network protocols, operating systems, and tools like Maltego, IDA, and VirusTotal..

Key responsabilities:

  • Conduct technical investigations to analyze malicious code and attack infrastructures.
  • Write reports and blog articles, and present findings at international conferences.
  • Enhance detection capabilities by creating detection rules and improving open source publications.
  • Collaborate with CERTs, CSIRTs, and other threat research teams to track and mitigate threats.

Sekoia logo
Sekoia Cybersecurity SME http://www.sekoia.io/en
51 - 200 Employees
See all jobs

Job description

Are you interested in producing actionable intelligence on cyber threats ?

Join the Threat Detection & Research team and help them enhance the Sekoia.io platform’s capabilities, ultimately better protecting our partners and customers.


Your missions:

To strengthen the investigation and detection capabilities of this TDR team, we are looking for a Senior Technical Analyst whose role will involve :

  • Conducting technical investigations leading to the discovery and analysis of malicious code and attack infrastructures associated with known or unknown clusters of activity.
  • Writing reports, blog articles, and attending international conferences to present your investigations and research to different types of audiences (expert or not).
  • Analysis of malicious code targeting different operating systems and creation of detection rules, particularly using YARA, Sigma and Suricata tools.
  • Technical supervising of some of the TDR team’s productions, whether in analyzing malicious code or infrastructure or drafting and structuring their reports.
  • Enhancing open source publications to track threats, discover new indicators, and feed our Sekoia SOC Platform system with new IOCs and rules.
  • Implementing new tools to detect and track threats within the technical ecosystem implemented by the TDR team.
  • Cooperation with CERTs/CSIRTs/LEAs and other threat research teams.


📍 The position can be based in Paris, Rennes, or in full remote. Business trips (paid for by the company) can be expected.


Preferred experience:

  • At least 5 years experience in the technical study of adversarial modus operandi, CERT/CSIRT, or offensive security (private and/or public);
  • Malicious code analysis skills (beginner level accepted);
  • Skills in analysing attack infrastructures (C2s, ORBs, etc.);
  • Skills in producing YARA, SIGMA and SNORT signatures;
  • Writing skills in English and French;
  • Python development skills in a professional context;
  • Good knowledge of network protocols and operating systems;
  • Working experience with Maltego, IDA, Ghidra, VirusTotal, Censys, Shodan etc. ;
  • Development of tools in a professional context (documentation, git, etc.);
  • Knowledge of cyber modelling (ATT&CK, STIX, Kill Chain, etc.);
  • Personal interest in international relations and geopolitics and good general knowledge and IT security watch;


Little extras that will make your application stands out :

  • At least one forensic experience outside the Windows scope (Mac, embedded system, smartphone);
  • Good knowledge of at least one major threat actor targeting the Western world (Russia, China, North Korea, Iran, etc.) or in organised cybercrime (RaaS etc.);
  • Full-stack development of simple applications (JavaScript ES6, Python Flask, etc.);
  • Experience in red-teaming offensive security or Good reverse engineering skills, ideally using IDA;
  • Technical OSINT skills;
  • Creativity in the approach to threat hunting.
  • Being comfortable using LLMs (Large Language Models) in a technical context;


👀 You are interested in this job but feel you haven’t ticked all the boxes? Don’t hesitate to apply, and tell us in the cover letter section why we absolutely must meet!


📝 Here's what's in store for you if you apply:

  1. HR Interview with Clémentine, Talent Acquisition Manager (45’)
  2. N+1 Interview with Nicolas, Head of Threat Detection & Research (TDR) team (60’) + ask for examples of publications (reports, conference)
  3. Skills fit with Senior Threat Researchers of the TDR team (60’)
  4. Final step with François, Chief Intelligence Officer (30’)


The program: discussions rather than trick questions ! These discussions will help you understand how Sekoia.io works and what it stands for. But they are also (and above all) an opportunity for you to tell us about your career path and your expectations for your next job!


Why join Sekoia.io ?>

Our values are simple and effective, and deeply rooted in our work habits: collaboration, benevolence, and innovation. Whether within our team daily, or in our customer relations, these values are the source of constant progress and the desire to constantly surpass ourselves!

Required profile

Experience

Industry :
Cybersecurity
Spoken language(s):
EnglishFrench
Check out the description to know which languages are mandatory.

Other Skills

  • Teamwork
  • Communication
  • Problem Solving

Researcher Related jobs