Related skills
java c python mitre att&ck ida pro📋 Description
- Identify and track threat actors and their TTPs.
- Develop strategies to hunt mobile threats.
- Reverse-engineer mobile malware capabilities.
- Investigate adversary C2 and phishing infrastructure.
- Conduct independent research; report findings to Threat Intelligence customers.
- Mine data sources to identify campaigns, malware families, actors.
🎯 Requirements
- Threat hunting across datasets with VirusTotal and Shodan.
- Big data tech: Lucene, ElasticSearch, AWS Athena.
- Reverse engineering software; mobile apps preferred.
- Experience with JEB, IDA Pro, Ghidra, Frida, Wireshark, DirBuster.
- Read Java and C; ARM, Objective-C, Swift bonus.
- OSINT investigations experience.
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Engineering Jobs. Just set your
preferences and Job Copilot will do the rest — finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!