clients worldwide, Recorded Future is the world's most advanced, and largest, intelligence company! Reversing Emulation and Testing (RET) is a core function of Insikt Group's Technical Analysis (TA) Team. We seek a principal technical threat researcher with deep subject-matter expertise across malwareanalysis, reverse engineering, and malicious tooling. This role requires the ability to … lead high-impact research and drive innovation in analytical capabilities within Insikt Group. You will guide and shape technical research into state-sponsored and cybercriminal malware, collaborating across functional intelligence teams to support finished intelligence reporting and platform enrichment. Your responsibilities will include not only conducting advanced malware reverse engineering and infrastructure emulation but also designing and implementing … internal tools and workflows that increase our team's efficiency. You will be expected to develop and formalize novel approaches to dynamic analysis, configuration extraction, and threat behavior modeling. This position entails representing Insikt Group's technical threat research in customer briefings, webinars, and industry engagements. You will communicate complex technical findings to diverse audiences ranging from internal stakeholders More ❯
Research Engineer - Threat Protection The Role As a Security Research Engineer at Mimecast, you will be a pivotal technical expert dedicated to researching, analyzing, and developing detections for both malware and phishing threats. Your work will involve dissecting real-world file and web threats, building and optimizing detection signatures, and driving improvements to our advanced detection systems. This role … evolving attacks and provide actionable insights to our customers and internal teams. Why Join Our Team? At Mimecast, you will be at the forefront of neutralizing diverse phishing and malware threats through comprehensive file analysis and research across web vectors. You will dissect attacker tactics, techniques, and procedures (TTPs), crafting and optimizing detection signatures using industry-standard tools … your work has immediate and significant customer impact. What You'll Do: Analyse and classify file and web-based threats, including credential phishing campaigns and a wide range of malware families. Develop, test, and maintain detection signatures (Yara, ClamAV, and proprietary solutions) for both phishing and malware threats targeting Mimecast customers. Dissect malicious files, URLs, and email payloads More ❯
security event data for proactive threat hunting, and conducting research on the latest threats and vulnerabilities to enhance incident response readiness and capabilities. Responding to security incidents, performing initial analysis and escalation as necessary. Participating in incident response planning and execution, ensuring timely containment and remediation of security breaches. Researching and analysing emerging threats and vulnerabilities to adapt security … Admin CISSP, CISM, GCIA, GCIH, GCFE, GCFA, GREM, Splunk Power User and/or similar certifications is preferred. Verifiable experience in Security Operations and Incident Response. Experience in performing analysis with SIEM technologies such as Splunk and/or Google Chronicle. Experience in performing proactive and reactive threat hunting using MITRE ATT&CK or similar frameworks. In-depth understanding … based and network-based IDS/IPS, WAF, EDR, etc. Very strong understanding of networking protocols, operating systems and cyber security concepts and technologies. Experience in forensic tools and malwareanalysis is a plus. Experience with Cloud environments such as AWS/GCP/Azure is a plus. Ability to work across different regions in a process/ More ❯
security event data for proactive threat hunting, and conducting research on the latest threats and vulnerabilities to enhance incident response readiness and capabilities. Responding to security incidents, performing initial analysis and escalation as necessary. Participating in incident response planning and execution, ensuring timely containment and remediation of security breaches. Researching and analysing emerging threats and vulnerabilities to adapt security … Admin CISSP, CISM, GCIA, GCIH, GCFE, GCFA, GREM, Splunk Power User and/or similar certifications is preferred. Verifiable experience in Security Operations and Incident Response. Experience in performing analysis with SIEM technologies such as Splunk and/or Google Chronicle. Experience in performing proactive and reactive threat hunting using MITRE ATT&CK or similar frameworks. In-depth understanding … based and network-based IDS/IPS, WAF, EDR, etc. Very strong understanding of networking protocols, operating systems and cyber security concepts and technologies. Experience in forensic tools and malwareanalysis is a plus. Experience with Cloud environments such as AWS/GCP/Azure is a plus. Ability to work across different regions in a process/ More ❯
our personalized learning opportunities - just to name a few! Job Description Your Career You will work firsthand with our valued customers to address their complex post–sales concerns where analysis of situations or data requires an in–depth evaluation of many factors. You're a critical thinker in understanding the methods, techniques, and evaluation criteria for obtaining results. You … permanent solutions. Share insights from customer interactions to improve our product and support experience. Document troubleshooting steps and resolutions clearly for both internal and customer use. Lead root cause analysis and coordinate corrective actions to prevent recurrence. Qualifications Your Experience Mandatory Requirements 🔒 Due to the nature of this role and the customers we support, candidates must either: Have lived …/IP) and security practices (IPSec, SSL-VPN, NAT, GRE). Hands-on experience with cloud infrastructure operations and troubleshooting customer tech stacks. Familiarity with SIEM tools, vulnerability management, malwareanalysis, and firewall configurations. Ability to communicate complex technical solutions to a wide range of audiences, both technical and non-technical. Skilled in Python, JSON, YAML, Bash, or More ❯
of the firm's information assets. In this role you will also act as the first point of contact for security-related incidents, and do other investigative work including malwareanalysis, email forensics, and other incident response activities. The successful candidate will be a hands-on, technically skilled security professional with experience across a broad range of cybersecurity More ❯