Related skills
python mitre att&ck wireshark ida pro ghidra📋 Description
- Identify, analyze and track advanced threat actors and their TTPs.
- Develop strategies to hunt mobile threats targeting enterprises and individuals.
- Reverse-engineer and analyze capabilities of mobile malware.
- Investigate adversary command-and-control and phishing infrastructure.
- Conduct independent research and report findings to Threat Intelligence customers.
- Mine internal and external data sources to identify new campaigns and actors.
🎯 Requirements
- Threat hunting across datasets; VirusTotal, Validin, Shodan; Lucene/ElasticSearch.
- Reverse engineering software; mobile app reversing preferred.
- Articulate technical findings in reports and presentations.
- Tools: JEB, IDA Pro, Ghidra, Hopper, Frida, Wireshark, DirBuster.
- Read Java and C; ARM Assembly, Objective-C and Swift bonus.
- OSINT investigations.
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Engineering Jobs. Just set your
preferences and Job Copilot will do the rest — finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!