Logo for Lookout

Staff Threat Intelligence Researcher

Roles & Responsibilities

  • Experience in threat hunting across multiple datasets and security tools (e.g., VirusTotal, Shodan) and leveraging big data technologies (Lucene, Elasticsearch, AWS Athena)
  • Experience in reverse engineering software (mobile app reversing preferred)
  • Ability to articulate technical findings in written reports and presentations
  • Experience with threat intelligence file types and terminology (MITRE ATT&CK, STIX, YARA, MISP, OpenCTI, and the Intelligence Cycle)

Requirements:

  • Identify, analyze and track advanced nation state and financially motivated threat actors and their TTPs
  • Develop strategies to hunt mobile threats targeting enterprises and individuals
  • Reverse-engineer and analyze capabilities of mobile malware
  • Investigate adversary command-and-control and phishing infrastructure

Job description

Please note that for this role, we are only considering residents of: AL, AR, FL, ID, IN, IA, KS, KY, LA, ME, MI, MN, MS, MO, MT, NE, NH, NM, NC, ND, OH, OK, SC, SD, TN, UT, VT, WV, WI, and WY.

Lookout, Inc. is the endpoint to cloud security company purpose-built for the intersection of enterprise and personal data. We safeguard data across devices, apps, networks and clouds through our unified, cloud-native security platform β€” a solution that's as fluid and flexible as the modern digital world. By giving organizations and individuals greater control over their data, we enable them to unleash its value and thrive. Lookout is trusted by enterprises of all sizes, government agencies and millions of consumers to protect sensitive data, enabling them to live, work and connect β€” freely and safely. To learn more about the Lookout Cloud Security Platform, visit www.lookout.com and follow Lookout on our blog, LinkedIn and Twitter.

We are looking for a Staff Security Researcher to join our Threat Intelligence team, a group of top-tier security researchers working to identify, investigate, and track targeted attacks on users of mobile devices. As a member of this team you will use an extensive arsenal of detection tools including the largest collection of mobile apps containing 200M+ Android and iOS apps to find and research mobile malware and hunt down malicious actors, their infrastructure, tooling and techniques.

What you’ll do:

  • Identify, analyze and track advanced nation state and financially motivated threat actors and their tactics, techniques, and procedures (TTPs).
  • Develop strategies to hunt mobile threats targeting enterprises and individuals.
  • Reverse-engineer and analyze capabilities of mobile malware.
  • Investigate adversary command-and-control and phishing infrastructure.
  • Conduct independent research and report findings to Threat Intelligence customers.
  • Mine internal and external data sources to identify new campaigns, malware families, and malicious actors.
  • Devise and implement new detection rules and develop innovative and efficient ways to expand and finetune coverage.
  • Prepare and deliver public media reports and present findings at conferences.
  • Participate in activities involving customers, prospects, and partners.

What we’re looking for:

  • Experience in threat hunting across multiple datasets, security tools such as VirusTotal, Validin, and Shodan and leveraging big data technologies (e.g., Lucene, ElasticSearch, AWS Athena).
  • Experience in reverse engineering software (mobile app reversing preferred).
  • Ability to articulate technical findings both in written reports and presentations. 
  • Experience using some of the following tools: JEB, IDA Pro, Ghidra, Hopper, Frida, Wireshark, DirBuster.
  • Ability to read code in Java and C; ARM Assembly, ObjectiveC and Swift is a bonus.
  • Experience in conducting OSINT investigations.
  • Ability to create research tools in Python.
  • Experience with threat intelligence file types, tools and terminology such as MITRE ATT&CK, STIX, YARA, MISP, OpenCTI and the Intelligence Cycle.
  • Interest in geopolitical dynamics and the ability to apply that context to inform intelligence analysis and threat hunting activities.
  • Curiosity and a strong drive to understand how both state and criminal actors operate.

 

 

The US base salary range for this full-time position is available below. We offer base + bonus + equity + benefits. The range displayed on each job posting reflects the minimum and maximum target for new hire salaries for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process. Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits.

 

Remote - US
$130,000β€”$149,000 USD

Cyber Threat Intelligence Analyst Related jobs

Other jobs at Lookout

We help you get seen. Not ignored.

We help you get seen faster β€” by the right people.

πŸš€

Auto-Apply

We apply for you β€” automatically and instantly.

Save time, skip forms, and stay on top of every opportunity. Because you can't get seen if you're not in the race.

✨

AI Match Feedback

Know your real match before you apply.

Get a detailed AI assessment of your profile against each job posting. Because getting seen starts with passing the filters.

Upgrade to Premium. Apply smarter and get noticed.

Upgrade to Premium

Join thousands of professionals who got noticed and hired faster.