Назад
Company hidden
11 часов назад

Principal Threat Researcher (Cybersecurity)

Формат работы
remote (только USA)
Тип работы
fulltime
Грейд
senior
Английский
b2
Страна
US
Вакансия из списка Hirify.GlobalВакансия из Hirify RU Global, списка компаний с восточно-европейскими корнями
Для мэтча и отклика нужен Plus

Мэтч & Сопровод

Для мэтча с этой вакансией нужен Plus

Описание вакансии

Текст:
/

TL;DR

Principal Threat Researcher (Cybersecurity): Leading adversary disruption initiatives to identify and neutralize threat actors targeting the hirify.global ecosystem with an accent on infrastructure takedowns, law enforcement collaboration, and TTP extraction. Focus on building custom investigative tooling, performing deep-dive research across massive datasets, and turning intelligence into actionable security hardening.

Location: Remote (US - Seattle Metro)

Company

Global leader in CRM and cloud software solutions.

What you will do

  • Lead initiatives to disrupt threat actor operations through strategic partnerships with hyperscalers (AWS, GCP, Azure) and network security providers.
  • Develop high-fidelity technical evidence and attribution data to support US and European law enforcement in criminal prosecutions.
  • Perform expert-level tracking of e-crime and state-sponsored actors, distilling complex TTPs into actionable intelligence.
  • Build custom scripts and automation using Python, SQL, and Splunk to scale research and enable real-time analysis.
  • Act as a technical mentor for junior researchers and bridge the gap between Incident Response, Security Engineering, and Platform Defense.

Requirements

  • 10+ years of hands-on experience identifying, tracking, and disrupting advanced cyber threat actors.
  • 5+ years of experience in strategic intelligence writing using BLUF, Diamond Model, and MITRE ATT&CK.
  • 3+ years of experience in scripting and automation with Python, Bash, SQL, Splunk, and using YARA or Sigma.
  • Proven track record of collaborating with international law enforcement agencies (e.g., FBI, Europol).
  • Expertise in conducting threat research using OSINT, infrastructure analysis, and malware telemetry.
  • Must be based in the US (Washington - Seattle Metro area).

Nice to have

  • Experience using Threat Intelligence Platforms and building custom integrations.
  • Experience applying Machine Learning for the detection and disruption of high-harm groups.
  • Deep familiarity with reverse engineering and malware analysis.
  • Recognized leadership status within the threat research community.

Culture & Benefits

  • Opportunity to work in a high-impact role neutralizing nation-state and eCrime adversaries.
  • Collaboration with a globally distributed team of security experts.
  • Access to massive datasets and advanced tooling to drive industry-wide security uplift.

Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →