Listing Description
***This role can be worked remotely from any country within EMEA where Zscaler has a legal entity***
The Senior Security Researcher - Threat Hunting will report to the Director Managed Threat Hunting. The Security Researcher will be primarily responsible for proactively hunting threats, blue teaming, performing exploit and vulnerability research, all in order to find and close holes exploited by threat actors.
ThreatLabZ is the security research arm of Zscaler. This world-class team is responsible for hunting new threats and ensuring that the 15 million users on the global Zscaler platform are always protected. In addition to malware research and behavioral analysis, team members are involved in the research and development of new prototype modules for advanced threat protection on the Zscaler platform, and regularly conduct internal security audits to ensure that Zscaler products and infrastructure meet security compliance standards. ThreatLabZ regularly publishes in-depth analyses of new and emerging threats on its portal, research.zscaler.com.
Responsibilities/What You’ll Do:
- Perform event correlation analysis using data gathered from a variety of sources to detect and confirm attacks
- Provide timely detection and alerting of possible attacks and intrusions
- Analyze activity to identify weaknesses that were exploited and perform root cause analysis
- Proactively hunting threats, blue teaming, performing exploit and vulnerability research, all in order to find and close holes exploited by bad actors.
- Malware, exploits and infection chain (kill-chain) research to ensure detection
- Write blog posts and whitepapers related to advanced threat analysis
- Write threat hunting signatures to discover new instances in Zscaler cloud and OSINT
- Work on internal automation projects and build tools to aid in threat hunting activities
- Continuously review security bulletins and related news; stay apprised of current threats and trends.
Qualifications
- have 5+ years of hands-on experience in a Security Information and Event Management tool, such as Splunk, Elasticsearch.
- Must have Hands-on Threat Hunting experience
- Strong understanding of tools, tactics and procedures (TTPs) of threats actors (eCrime/APT)
- Experience in Incident Analysis and Response using industry standard frameworks such as MITRE ATT&CK and the Cyber Kill Chain
- Experience with Malware analysis - Dynamic & Static, Tools like – IDA Pro, Ollydbg, Wireshark etc.
- Must be able to validate findings, perform root cause analysis, and deliver recommendations for fixes.
- Strong scripting and automation skills are must (Python preferable)
- Must have excellent reporting and analytical skills.
- Strong understanding of web protocols and web application security
- Experience writing IDS/IPS, YARA signatures
#LI-REMOTE
#LI-MD3
Listing Details
- Citizenship: Not Provided
- Incentives: Not Provided
- Education: Not Provided
- Travel: Not Provided
- Telework: Not Provided