Research Engineer Team Lead - Talos

July, 05 2020 - Singapore

Talos wants you! As a member of the Detection Research Team, you will research vulnerabilities in software and network protocols and how they are exploited. You will be responsible for creation of detection content for the technologies Talos supports and act as a trusted security partner within the Talos organization and Cisco. You will learn to take a Proof-of-Concept (PoC), verify it exploits the vulnerable condition, create a PCAP of the network traffic created during exploitation, and write detection content to detect that exploitation, while not generating False Positives. You will join a team of subject matter experts in a wide range of fields & technologies, as well as newbies fresh out of college or the local CTF competition!

Responsibilities:

  • Oversee a team not to exceed 10 Analysts to:
    • Ensure work performed aligns with team’s goals as collaboratively determined with Talos Management
    • Reprioritize work of team members quickly in the face of newly emergent threats
    • Produce reporting on team goal setting and satisfaction to Talos Management
    • Protect team members from bureaucracy so they can do their jobs
    • Serve as conduit for team members to communicate with organizations / teams outside of Talos
  • Analyze 0days and new security threats and tools
  • Analyze malware samples using static/dynamic analysis, debuggers
  • Create advanced detection content for Snort, ClamAV, AMP, and Security Intelligence
  • Write detailed technical advisories on new vulnerabilities
  • Capture network traces from exploits for testing IPS and IDS security effectiveness
  • Develop small tools as necessary (this is not a software development position)

Minimum Requirements:

  • Four years work experience in the security industry
  • Solid base knowledge of networking, transport, and application layer protocols, such as IP, TCP, UDP, and HTTP, SMTP, POP, IMAP, SIP, and SSL
  • Experience with vulnerability analysis
  • Experience with common methods of exploitation, such as Buffer Overflows, Cross-site Scripting, Cross-site Forgery, and Reflection Attacks
  • Experience with the structure of common file formats, such as PDF, DOC, and SWF
  • Familiarity with structures in memory, such as the Stack and the Heap
  • Experience with OllyDbg or IDA Pro
  • Experience working in both Windows and Linux
  • Experience with network traffic dissectors such as Wireshark
  • Experience with Perl, Python, or Ruby
  • Excellent technical writing skills
  • Superb Analytical and problem-solving skills
  • Superb organization, decision making, and verbal and written communication skills
  • Ability to work independently with minimum supervision and take on additional tasks as required
  • Ability to work with small teams to solve complex problems
  • Experience with Snort rules language

Preferred Skills & Qualifications:

  • Bachelor’s degree in Computer Science, Cyber Security, or other tech-related degree