Security Researcher Resume Samples

4.9 (96 votes) for Security Researcher Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the security researcher job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
JH
J Huel
Jaylen
Huel
325 Fisher Ports
San Francisco
CA
+1 (555) 168 2133
325 Fisher Ports
San Francisco
CA
Phone
p +1 (555) 168 2133
Experience Experience
New York, NY
Security Researcher
New York, NY
Brekke Inc
New York, NY
Security Researcher
  • Familiarity with Windows networking and windows security model, Active Directory managed networks
  • Develop protection against network attacks/threats
  • A top performer working independently or with a team
  • Be part of our growing team of security and data experts developing new ways to detect advanced attackers and other network behaviors
  • Practical knowledge of managed (e.g. JVM) and unmanaged execution environments
  • Become an expert on how networks, endpoints and users really work – theoretically, practically, and mathematically
  • Working in a very team-oriented environment and interacting with engineers from other design disciplines
Phoenix, AZ
Application Security Researcher
Phoenix, AZ
Kohler-Pollich
Phoenix, AZ
Application Security Researcher
  • Working with other scrum teams for security-focused design
  • Documenting findings in reports and working with teams on remediation
  • Work cross functionally to scope schedule and then analyze results from Red Team exercises on software products
  • Research new application security technologies and implement them to improve application security
  • Provide response for security related incidents reported for software products
  • Understand application security methodologies and frameworks
  • Coach and mentor developers to write and implement cryptography (PKI, Code Signing, Stored Secrets etc)
present
New York, NY
Senior Security Researcher
New York, NY
Shanahan-Purdy
present
New York, NY
Senior Security Researcher
present
  • Provide mentorship to Dell SecureWorks team members and customers on security strategy, tactics, techniques, and procedures; and
  • Analyze and evaluate new web application security threats, and develop protection mechanisms for Akamai’s WAF, Client Reputation and Bot Manager
  • Collaborate with researchers, coordinators and developers to improve the protection capabilities of the products
  • Work with other internal and external teams to forge new and improve existing partnerships that help mature the product
  • Apply threat research to create customer protections to include documenting, developing, testing and optimizing security countermeasures
  • Provide advice on security practices and procedures to peers and clients
  • Develop tools, signatures and methods of detection for active threats
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Baylor University
Bachelor’s Degree in Computer Science
Skills Skills
  • Good communication skills and an eye for detail. Able to perform well under stress, particularly in emergency response situations
  • Strong research skills, data knowledge, and ability to analyze and present complex data visually in a meaningful way
  • Strong oral and written communication skills with demonstrated attention to detail and results orientation
  • Maintain awareness of up-to-date threat and vulnerability profiles
  • Problem framing: being able to identify if the question being asked is the right one, and if not, to be able to ask the right questions
  • Being able to ramp-up in new technological domains very quickly
  • Strong technical communication skills, both written and verbal
  • Strong understanding of operating system and computer networking concepts
  • Strong technical and thought leader with skills in various scripting tools and/or C# programming
  • 3+ years of professional experience within Cloud Security or Security Research role
Create a Resume in Minutes

15 Security Researcher resume templates

1

Senior Computer Security Researcher Resume Examples & Samples

  • Interact with customer managers and lead researchers in developing research programs and agendas
  • Actively participate in basic research in collaboration with government and industry partners, producing regular publications, briefings and conference presentations
  • Provide documentation for customer requirements and research results
  • Assist with the evaluation, selection, design, and execution of research programs in cyber security
  • Analyze relevant cyber security scholarly publications to ensure that state-of-the-art techniques are pursued
  • Minimal travel is required
  • Masters Degree in a quantitative discipline (Computer Science, Mathematics, Statistics, etc.) + 15 years of experience
  • Familiarity with at least one of the following programming languages: Java, C/C++, Python, Perl
  • Knowledge of the following: networking protocols, Linux operating systems, machine learning, current security threats, and attack scenarios
  • Track record of recent publications in a relevant area
  • PhD in Information Technology or a related field
  • Experience in cyber security is desired
  • Topics of research will include: basic research in network intrusion detection; adaptation and application of state-of-the-art machine learning and data analytics methods to threat analysis and insider threat detection; research and development of automated methods for malware detection and analysis; basic and applied research in trust, security and reliability in wireless ad-hoc networks; human-computer interactions in network defense operations
  • We are seeking candidates with expertise, as demonstrated by research publications or software implementations, in the use of any of the following techniques for solving real-world problems: large-scale machine learning techniques, statistical analysis (particularly Bayesian methods), game-theoretic techniques, threat analysis and modeling, graph theory, human cognitive models, reinforcement learning. As strong preference is given to publications applying these techniques to security problems and published open-source software
  • Demonstrated professionalism, strong written and oral communication skills and the ability to work independently
  • Exhibit strong team player skills with a willingness to assume responsibility and respond to new challenges
  • Capable of quickly understanding new systems with limited training, manuals and technical support
2

Senior Computer Security Researcher Resume Examples & Samples

  • Masters Degree plus 10 years IT security experience
  • Track record in IT security research, as evidenced by relevant research publications
  • Topics of research will include theory, metrics, models and novel techniques in network security, risk assessment, malware and intrusion detection, defenses against malicious activities on computer networks and wireless networks
  • Preferred skills in disciplines and fields: statistical methods, information-theoretic approaches, game-theoretic approaches, plan recognition, adversarial reasoning techniques, network theory and analysis, data and information fusion, deception analysis, Bayesian methods, human cognitive models, machine learning of threat behavior, automated signature derivation, risk and vulnerability analysis, attack prediction, alert correlation and prioritization
3

Security Researcher Resume Examples & Samples

  • Must have a PhD in Electrical Engineering, Computer Science, Computer Engineering, or other science/engineering related field or MS +5 years hands-on experience or BS +7 years hands-on experience & track-record of success in security
  • Minimum of 1 year experience with hardware/software/network security
  • Minimum of 1 year experience with security methodologies and/or security framework
  • Proficiency in computer architecture with depth in at least one focused area
  • Minimum of 2 year experience with security technologies (for example, authentication, cryptography, secure protocols), security vulnerabilities and attack profiles
  • Minimum of 2 year experience with x86 and C development skills
  • Minimum of 2 year experience with software and/or hardware testing and tools, low level debug
4

Security Researcher Resume Examples & Samples

  • Must have a BS in Electrical Engineering, Computer Science, Computer Engineering, or other science/engineering related field
  • Minimum of 3 months experience with hardware/software/network security
  • Minimum of 3 months experience with security methodologies and/or security framework
  • Minimum of 3 months experience in computer architecture with depth in at least one focused area
  • Minimum of 6 months experience with security technologies (for example, authentication, cryptography, secure protocols), security vulnerabilities and attack profiles
  • Minimum of 6 months experience with x86 and C development skills
  • Minimum of 6 months experience with software and/or hardware testing and tools, low level debug
5

Security Researcher Resume Examples & Samples

  • Knowledge of security technologies (for example, authentication, cryptography, secure protocols), security vulnerabilities and attack profiles
  • Demonstrated expertise with computer architecture
  • Creation of test plans and test content for validating platform and system components
  • Ability to work in a less structure start-up type environment
  • Strong oral and written communication skills with demonstrated attention to detail and results orientation
  • X86 and C programming skills
6

Security Researcher Exploit Resume Examples & Samples

  • Must have a MS or PhD in Computer Science, Computer Engineering or a similar technical discipline
  • Minimum 2 years of post-graduate experience with the following skillsets
  • Hardware Design
  • Functional and Microarchitecture Simulation
  • Systems Programming
  • Processor Architecture
  • 2+ years of experience with the additional skillsets
  • Secure Systems development
  • Cryptographic algorithms
  • Validating hardware designs
  • Familiarity with bus protocols
7

Security Researcher Resume Examples & Samples

  • Validation of Intel product features in cluster test, super cluster and FC test environments
  • Validating designs by authoring validation plans, writing focus tests, creating templates defining coverage strategies, developing and analyzing coverage monitors, creating event injectors, writing architectural and micro-architectural correctness checkers, developing BFMs (Bus Functional Model), running functional simulations, and debugging failures to root cause
  • Developing comprehensive threat models, security test plans, vulnerability assessment during all phases of the product development cycle (architecture, design, implementation and penetration testing), and devising and implementing creative ways to attack these vulnerabilities and drive for resolution
  • Maintaining and enhancing the validation infrastructure by creating new tools to support validation
  • Contributing to the organization's longer-term technical vision by identifying and driving technologies that offer shorter validation cycles, higher quality silicon (no bug escapes) or methodologies that provide significant productivity gains
  • 7+ years of hands-on experience & track-record of success in pre-silicon validation
  • Proficiency with coding in either specman, C/C++, or SV OVM/UVM
  • Proficiency with debug of medium and high complexity simulation failures
  • Proficiency with validation architecture & infrastructure
  • Works well in a team environment (able to collaborate with peers, able to mentor and provide technical guidance to more junior engineers)
8

Security Researcher Engineer Resume Examples & Samples

  • Can you program? In multiple languages?
  • Have you played in a CCDC, CTF, or spent time on Crackmes? Did you score points?
  • Do you know what the OWASP Top 10 is? Can you recite them from memory?
  • Are you familiar with debuggers?
  • Do you have experience attacking web apps?
  • Have you authored a Metasploit module?
  • Are you familiar with encryption and its usage?
  • Minimum 0-2 years experience
  • Experience or understanding of software applications design tools and languages
  • Understanding of design for software applications running on multiple platform types
  • Good written and verbal communication skills; mastery in English and local language
9

Ctu Senior Security Researcher Threat Intelligence Resume Examples & Samples

  • Identify and lead performance of proactive all-source research to identify and characterize new threats, vulnerabilities, and risks to customer security context
  • Interact with clients and the security community to understand evolving threat context for advanced threat research
  • Perform second-tier malware analysis to include reverse engineering
  • Produce actionable intelligence information for delivery to clients in the form of threat research reports, threat indicator data feeds, helpdesk ticket responses, and briefings
  • Influence global security through publication and presentation of new and novel security research
  • Provide expert-level security consultation in support of other business units, to include Security Operations Center, Security Risk Consulting, Sales, Marketing, Engineering, and Product Management
  • Provide input into strategic direction of organization and services in areas without precedent
  • Provide expert advice to security researchers and clients on security strategy, policies, and procedures; and
  • Generate and apply innovation via moderate-to-long term projects to improve value of existing service lines and inform creation of new service lines
  • 5+ years of professional experience in systems administration, systems engineering, software development, and/or TCP/IP network administration
  • 5+ years of experience with a variety of security-related contexts, including secure coding practices, vulnerability analysis, IDS/IPS, cloud computing, virtualization, mobile security, incident response, digital forensics, malware analysis, threat research, DDoS mitigation, or intelligence analysis
  • 5+ years of experience with scripting-level programming in at least two of Perl, Python, PHP, Javascript, and/or shell programming
  • 2+ years of experience analyzing malicious code to include reverse engineering
  • Fluency in at least two high-level programming languages such as C/C++, Java, Delphi, or Visual Basic
  • Fluency in x86 assembly language on 32 and 64 bit platforms
  • Ability to make use of diverse datasets to create value
  • Technical knowledge of fundamental web protocols and technologies, to include HTTP, HTTPS, HTML, Javascript, XML, AJAX, JSON, and REST
  • Demonstrated and recognized expertise in at least one aspect of information security, to include significant publication and/or presentation of new or novel research topic to public forum, conference, or media outlet
  • Demonstrated track record of identifying and pursuing strategic and complex areas of security research in collaboration with internal and external stakeholders at all levels, to include defining appropriate policies, practices, and countermeasures
  • Demonstrated ability to participate in private information sharing and analysis programs limited to vetted and trusted members
  • Courage and willingness to challenge conventional wisdom
  • Unimpeachable personal and professional integrity
  • Strong technical communication skills, both written and verbal
  • Inherent passion for information security and service excellence
  • Limited travel when required
  • Experience as a technical team leader or experience in leading small to medium sized teams
  • Experience leading medium to large scale technical projects involving multiple internal and external stakeholders
10

Security Researcher Resume Examples & Samples

  • Build and improve the security logic of the IBM Security AppScan
  • Remotely Exploitable Vulnerability in the Dropbox SDK for Android
  • Basic knowledge in Security Research
11

Security Researcher Resume Examples & Samples

  • Threat research and analysis
  • Media spokesperson
  • Develop and disseminate thought leadership through white papers, reports, and presentations
  • Gather, analyze, and synthesize information from internal and external sources
  • Translate research findings from disparate arrays of facts into a coherent analysis of trends
  • Collaborate with cross-functional project teams to determine what information is needed and how best to present the findings
  • Organize and maintain a searchable archive of work produced by the research team
  • Act as an insights evangelist to internal and external clients including Cloudmark employees, customers, partners, industry analysts and the media
  • Determine critical knowledge gaps based on synthesizing internal data, industry knowledge, project needs, and Cloudmark’s business goals
  • Lead the translation of context research findings into actionable foundational insights and opportunity areas; communicate the insights and recommendations to internal and external customers and multidisciplinary teams and help to drive their application
  • Speaking engagements at conferences and other industry opportunities
  • Experience uncovering, analyzing, and synthesizing qualitative and quantitative data centered ideally on the messaging security market
  • Demonstrable understanding of and facility with secondary / context research, data mining, market / user research, a range of qualitative and quantitative research methods, and insight generation as well as the types of resources used to extract information
  • A thorough, detail-oriented approach combined with an ability to discover new sources of information and developing new ways of packaging and sharing that information in ways that resonate with various audiences
  • Excellent oral and written communication skills including the ability to construct and deliver compelling and succinct presentations, collateral and reports to internal and external teams
  • Expert in PowerPoint and presentation-building, Excel, and Word
  • Speaking to large audiences on security research and industry trends
  • Experience mentoring junior staff
  • 5+ years of relevant experience or equivalent combination of education and work experience
  • Inherent passion for information
12

Senior Security Researcher Resume Examples & Samples

  • Expert knowledge in intelligence analysis and reporting using common tools and techniques
  • Expert knowledge in security and exploit/malware detection technologies, analysis and reverse engineering
  • Solid programming skills with scripting languages such as Perl or Python is required
  • Familiarity with virtual machine software and setting up repro environments for vulnerability research is required
13

Application Security Researcher Resume Examples & Samples

  • Penetration testing: discovering vulnerabilities in web, native, and mobile applications
  • Exploiting vulnerabilities
  • Exfiltrating sensitive data and assets
  • Documenting findings in reports and working with teams on remediation
14

Security Researcher Resume Examples & Samples

  • One Class to Rule Them All: 0-Day Deserialization Vulnerabilities in Android (CVE-2015-3825/37) (USENIX WOOT '15, RSA Conference '16)
  • Attacking the Linux PRNG on Android. (USENIX WOOT '14, BlackHat EU '14)
  • Android KeyStore Stack Buffer Overflow (CVE-2014-3100)
  • Remotely Exploitable Vulnerability in the Dropbox SDK for Android (CVE-2014-8889)
  • SpoofedMe - Intruding Accounts using Social Login Providers
  • Remote Exploitation of Apache Cordova (CVE-2014-3500/1/2)
  • Firefox for Android Profile Directory Derandomization and Data Exfiltration (CVE-2014-1484, CVE-2014-1506/15/16)
15

Application Security Researcher Resume Examples & Samples

  • Be responsible for providing technical leadership and defining, developing, and evolving security within software in a fast paced and agile development environment using the latest secure software development technologies and infrastructure
  • Work with Cyber Security Leaders and SMEs to understand product requirements & vision
  • Coach and mentor developers to write and implement cryptography (PKI, Code Signing, Stored Secrets etc)
  • Provide response for security related incidents reported for software products
  • Provide guidance and advise on writing secure code that meets standards and delivers desired functionality using the technology selected for the project
  • Understand application security methodologies and frameworks
  • Leverage tailored Secure SDL practice into specific engineering
  • Develop security requirements and utilize best practices to meet them
  • Research new application security technologies and implement them to improve application security
  • Working with other scrum teams for security-focused design
  • Promotes best practices based on OWASP, MSDL etc
  • BACHELOR'S DEGREE IN COMPUTER ENGINEERING OR IN A STEM MAJOR (SCIENCE, TECHNOLOGY, ENGINEERING, OR MATH) AND/OR A MINIMUM OF 5 YEARS OF EQUIVALENT EXPERIENCE MINIMUM OF 4 YEARS OF PROFESSIONAL EXPERIENCE IN DEVELOPING SECURE APPLICATIONS
  • At least 3 years of experience involvement with development team(s) that delivered software based services
  • Hands-on experience with developing RESTful Java WebServices/MicroServices (Spring Boot) using Oracle MySQL and PostgreSQL
  • Knowledge or experience of running applications in a cloud based platform like Cloud Foundry is a big plus
  • Experience in Pen Testing web applications and OWASP methodologies
  • Security CERTS such as CEH, SANS or CompTia etc
16

Cyber Security Researcher Resume Examples & Samples

  • Cyber security professional with a minimum of 2 years of experience in threat modeling and hands-on application level penetration testing
  • Must possess strong verbal & written communication skills in English, with demonstrated experience
  • O Real-Time Control System Protection
17

Lead Cyber Security Researcher Resume Examples & Samples

  • Cyber security professional with a minimum of 5 years of experience in threat modeling and hands-on application level penetration testing
  • Bachelor's degree in Computer Science or a related field with at least 2 years of relevant experience in software/hardware research and development
  • Must be willing to work out of an office located in Herzliya, Israel
  • Must submit to a background investigation, including verification of past employment and educational background
  • GE is interested in experienced talented individuals who have expertise in these types of technologies
  • Reliable and responsible
  • Passionate about cyber security
  • Versatile, fast learner and highly resourceful
  • Ability to work independently and as part of the team
18

Security Researcher Resume Examples & Samples

  • Must have an MS or PhD in Computer Science or Computer Engineering or Electrical Engineering OR a minimum of 5 years of relevant industry experience
  • Minimum 1yr experience with hardware architecture, design and implementation
  • Minimum 1yr experience with security technologies (for example, authentication, cryptography, secure protocols), security vulnerabilities and attack profiles
  • Minimum 1yr experience with x86 and C development skills
  • Minimum 1yr experience with software and/or hardware testing and tools, low level debug
19

Security Researcher Resume Examples & Samples

  • Researching and analyzing a wide array of malware and file formats
  • Responsibilities may include threat assessment, design of security components, vulnerability assessment
  • Provide generic solutions for detection and remediation as necessary for integration into the Intel Security antivirus product line
  • Responds to customer/client requests or events as they occur
  • Conduct deep research into specific families or attacks when necessary
  • Maintains substantial knowledge of state-of-the-art security principles, theories, attacks, and contributes to literature and conferences
  • Authoring descriptions for inclusion into the Intel Security Virus Information Library and Threat Advisories
  • Self-motivated with the ability to stretch in times of customer incidents
  • At least 2-3 years in anti-malware research or related security experience
  • Experience in malicious code analysis and reverse engineering (RE)
  • Experience with C/C++ and Windows API
  • Experience with IDA or equivalent disassembly tools
  • Experience with OllyDbg and WinDbg; or equivalent debuggers
  • Good understanding of Assembly language, Intel architecture and corresponding Instruction formats
  • In-depth knowledge of the Portable Executable (PE) file format and operating systems (especially Windows). Knowledge of other formats such as PDF, SWF, OLE, etc
  • Knowledge of networking protocols such as TCP/IP, DNS, SMTP etc
  • Knowledge of scripting languages such as Python, Perl etc
  • Understanding of Windows Internals and Data structures
  • Must possess good analytical and problem solving skills
  • Bachelor’s degree in Computer Science or related technical field with good academics
  • Proficiency in analyzing advanced malware such as exploits, rootkits, polymorphic and obfuscated malware
  • Knowledge of OS X and Linux
20

Security Researcher Resume Examples & Samples

  • Strong networking background, experience with network security, good programming skills and good knowledge of exploitation and vulnerabilities
  • Layer seven protocol parsing for network-based IPS
  • Attack signature writing for network-based IPS
  • Threat analysis, vulnerability research
  • Enhance the infrastructure to facilitate vulnerability research and attack signature release process
  • Solid networking background, especially with TCP/IP protocol stack
  • Experience with network security
  • Experience with software development especially skills in programming languages such as C
  • CS related graduate or 1 years+ work experience, a master degree is preferred but not required
21

Senior Security Researcher Resume Examples & Samples

  • IDA or equivalent disassembly tools
  • Malicious code analysis and reverse engineering
  • Operating systems, including Windows platforms in both user and kernel modes
  • Static and dynamic reverse engineering of malware bots, such as Stuxnet, Conficker, Aurora, or Storm
  • Network protocols and protocol analyzers, such as .HTTP, P2P, IM, IRC, or SSL
  • Malware analysis and reverse engineering tools such as wireshark, tcpdump, ollydbg, windbg or Ida Pro
  • Databases including MySQL
  • Programming using scripting languages such as Perl, Python, or Bash
22

Security Researcher Resume Examples & Samples

  • Ph.D or a Master's degree in Computer Science, Computer Engineering or Electrical Engineering or equivalent discipline with knowledge of computer security, applied cryptography, computer architecture, operating systems and programming (C, IA Assembly)
  • Minimum of 6 months experience with hardware/software/network security
  • Minimum of 6 months experience with security methodologies and/or security framework
  • Minimum of 6 months experience in computer architecture with depth in at least one focused area
  • Demonstrate results in projects involving some of the above areas
  • Minimum of 12 months experience with security technologies (for example, authentication, cryptography, secure protocols), security vulnerabilities and attack profiles, including security threat analysis and knowledge of existing attacks on Intel platforms is highly desirable
  • Minimum of 12 months experience with x86 and C development skills
  • Minimum of 12 months experience with software and/or hardware testing and tools, low level debug. Experience with hacking hardware (programming FPGAs, Flash chips, etc) would be a plus
23

Security Researcher Resume Examples & Samples

  • Working in a very team-oriented environment and interacting with engineers from other design disciplines
  • Planning & performing internal penetration tests
  • Supervise external penetration tests (analysis of the results, vendor selection, etc.)
  • Must have an MS or PhD in Computer Sciences
  • Practical knowledge of the following programming languages: C/C++, C#, Java, Python, JavaScript
  • Practical knowledge of managed (e.g. JVM) and unmanaged execution environments
  • Minimum 3yr experience with software architecture, design and implementation
  • Minimum 1yr experience with security technologies; for example: knowledge of authentication schemes, PKI, cryptography, security vulnerabilities and attack profiles
  • Minimum 1yr experience with software testing
  • Knowledge of security technologies, for example: authentication, cryptography, secure protocols, security vulnerabilities and attack profiles
  • The candidate should be familiarized with the knowledge presented in the following Coursera trainings: Cryptography I, Cryptography II and Computer Security
  • Being able to ramp-up in new technological domains very quickly
  • Willing take on responsibilities related to security of projects
  • Being able to work in conditions with tight deadlines
  • Being able to switch between contexts (e.g. leading secure development lifecycle activities for at least two projects)
24

Senior Security Researcher Resume Examples & Samples

  • Must have an MS or PhD in Computer Engineering, Electrical Engineering or Computer and Electrical and Computer Engineering
  • Minimum 10yr experience in IA, hardware architecture, design and implementation
  • Minimum 5yr experience with security technologies (for example, SGX, CSE, TXT, PFAT, authentication, cryptography, secure protocols), security vulnerabilities and attack profiles
  • Minimum 5yr experience with x86, SystemVerilog, assembly, high level programming language
  • Minimum 5yr experience with hardware and/or software testing and tools, low level debug. Knowledge in both pre-Si and post-Si validation methodologies and applied tools is a must (simulation, emulation, ITP, PythonSV, etc
25

Security Researcher Resume Examples & Samples

  • MS/Phd preferred in CS, Math, Physics or equivalent work experience with notable accomplishments
  • Experience working with a MapReduce framework (Hadoop, MapReduce, Spark)
  • Experience developing with Python, C/C++, or Java in a *nix environment
  • Strong background in probability/statistics/optimization theory
  • Experience working with large datasets (terabytes to petabytes)
  • Familiar with Hidden Markov Models, graphical models, and random forests
  • Experience mentoring junior members on team
  • Research record and passion for solving complex problems
26

Cyber Security Researcher Resume Examples & Samples

  • 5+ years of experience with research in at least one of the following: Cyber security, reverse engineering, vulnerability analysis, or exploit development
  • Knowledge of Windows OS and UNIX or Linux-based operating systems and the windows registry
  • Ability to evaluate and integrate these new tactics into existing processes and train operators on their implementation
  • Ability to work with people at every level
  • DoD 8570 IAT Level II Certification, including Security+
  • Experience with DoD civilians, military, and government contractors
  • Experience with Big Data and analytics
  • BS degree in CS, Computer Engineering, MIS, Information Security, or a related field
  • Industry Standard Certifications, including CISSP or GIAC
27

Security Researcher / Software Engineer Resume Examples & Samples

  • Experience with low-level programming or the development of device drivers
  • Experience with debuggers, including gdb, windbg, or Ollydbg
  • Ability to manage multiple assignments and adjust priorities based on mission requirements
  • Experience with implementing or analyzing cryptographic algorithms or protocols
  • Experience with network traffic analysis using tools, including Wireshark and TCPDump
  • Experience with at least one scripting language, including Python or Perl
  • BA or BS degree preferred
28

Embedded Security Researcher, Senior Resume Examples & Samples

  • 3+ years of experience with software development using C/C++ in Windows, UNIX, or Linux
  • Experience with the C programming language
  • Possession of excellent oral and written presentation skills
29

Embedded Security Researcher, Junior Resume Examples & Samples

  • 1+ years software development experience with C/C++ in Windows, UNIX, or Linux
  • Experience with low-level programming or development of device drivers
  • Experience with Binary Firmware Analysis and Reverse Engineering using IDA Pro
  • Experience with Protocol Analysis
  • Experience with at least one scripting language, including Python
  • Experience with presenting research at conferences
  • Experience with the following tools: Wireshark/TCPDump, GNU binutils, gcc, and proprietary toolchains and build environments
30

Cyber Security Researcher Resume Examples & Samples

  • Bachelor’s degree in Computer Science or Electrical Engineering
  • Proficiency in at least one systems programming language (e.g. C, C++) and at least one scripting language (e.g. Python, Perl)
  • Demonstrated hands-on experience with operating systems (Linux or Windows)
  • Effective communication and writing skills
  • U.S. Citizen or U.S. Permanent Resident
  • Experience with cyber security technologies including intrusion detection and attack mitigation
  • Experience with performing scientific experiments, investigations, observations and related research studies into the nature and operation of computer and networked systems, using scientific methods
  • Experience with modeling and simulation of wired and wireless networks using tools such as ns-3, OPNET, QualNet
  • Experience with virtualization technologies
31

Security Researcher Resume Examples & Samples

  • B.SC or M.SC in Computer Science Software Engineering Computer Engineering
  • Experience with embedded SW, C/C++/Java, secure coding, fuzzing, exploitation knowledge, crypto
  • In-depth knowledge of security and networking standards
  • Advantage will be given to those with experience in
32

Senior Security Researcher Resume Examples & Samples

  • Interact with clients, respond effectively to client issues, and understand client threat context to inform emerging threat research
  • Use threat research to develop actionable intelligence to drive client protection to include producing analysis to inform countermeasure development
  • Generate and apply innovation via short-to-moderate term projects to improve efficiency, effectiveness, and service value
33

Security Researcher Resume Examples & Samples

  • Collaborate with a team of security domain experts, data scientists, platform engineers and product managers to identify security threats
  • Conduct research activities including idea proposition, review, prototyping and feature spec suggestion
  • Research fields may include but not limited to: incident response and forensics, reverse engineering, statistical analytics, competitive analysis, log analytics, machine learning approaches
  • Analyze logs from enterprise IT devices and create parser configurations to extract meaningful information
  • Expand coverage for supported devices and SIEMs
  • Consult with internal security operations teams to design and develop custom content for SIEM
  • Build and manage Security use cases and content
  • Define and refine the security information model and rule base
34

Security Researcher Resume Examples & Samples

  • Work with engineering teams through all stages of the SDL; educate teams on general software security, provide secure software design guidance, perform design and implementation assessments and work on novel solutions on issues found
  • Conduct research and report on current and emerging threats to BlackBerry products and the more general software security ecosystem
  • Research and identify new threats and mitigations that may impact BlackBerry products and the general software security ecosystem
  • Develop tools to analyse and find security issues that impact both BlackBerry’s and client’s products
  • Deliver external security services to clients ranging including architecture and design assessments, IT infrastructures, mobile application web sites assessments and social engineering of staff
  • Undertake continual skills and knowledge development
  • Extensive architectural and security knowledge of one or more of the following areas
35

Cyber Security Researcher / Engineer Resume Examples & Samples

  • 3+ years of experience in Cybersecurity, software engineering, developing, or scripting, advanced Cyber research, network intrusion detection, host intrusion detection, or SIEM usage or development
  • 3+ years of experience in digital forensics, malware analysis and reserve engineering, networking, routing, or switching, vulnerability assessment or penetration testing, ICS or SCADA, or threat data sharing and IOC development
  • Possession of excellent technical writing skills
  • BS degree in CS, Computer Engineering, Management Information Systems, Information Security, or a related degree
  • Industry Standard Certifications, including CISSP and GIAC
  • DoD 8570 IAT Level II Certification, including Security+ or equivalent Clearance
36

Senior Security Researcher Threat Intellligence Resume Examples & Samples

  • Perform proactive all-source research to identify and characterize new threats to the client base
  • Drive research innovation and continuous coverage of malicious activity in underground and deep-web forums
  • Manage an assigned load of clients; interacting regularly with customers in both written and verbal correspondence; working with clients to determine intelligence requirements and understand threat context
  • Produce actionable intelligence in the form of monitoring alerts, OSINT reports, and client briefings
  • Perform threat modelling to contextualize data in order to provide customers with a greater understanding of current threats
  • Develop mitigation and countermeasure strategies from collected threat intelligence to inform client decision support
  • Develop innovative new ways to leverage existing data and correlate Surveillance team data with other sets available in the CTU and SecureWorks at large
  • Experience with intelligence analysis processes, including Open Source Intelligence (OSINT) and closed source intelligence gathering, source verification, data fusion, link analysis, and threat actor profiling
  • Experience and proven background researching threats using TOR, I2P, IRC, leveraging un-indexed web content and identifying changes to the underground landscape as they occur
  • Familiarity with *nix-based command line tools
  • Familiarity with advanced searching engine functionality and search query customization
  • Passionate about information security and service excellence
  • Willingness to provide on-call and off-hours coverage as necessary
  • Ability to travel occasionally for team on-sites and research conferences/strategic planning
  • Experience with data mining and social network analysis
  • Experience with Linux, Windows and Mac OS X
  • Experience with scripting-level programming in one of Perl, Python, PHP, Javascript, and/or shell programming
  • Familiarity with common open source and metadata research frameworks
37

Security Researcher Resume Examples & Samples

  • Review designs with more senior members of InfoSec staff
  • Analyze systems for safety, security, and resilience issues; and propose and help develop solutions
  • Aid architects in product team engagements
  • Respond to security incidents as incident manager or subject matter expert
  • Identify research opportunities, make hypotheses, design and carry out experiments, draw conclusions, and present results inside and outside InfoSec
  • Bachelor's degree in engineering, mathematics, statistics, computer science, or related field plus 5 years of experience
  • Minimum 2 years of experience in at least two programming languages, including a scripting language, and ideally including a functional language. Exposure to a wide range of language types (e.g., scripting, Unix-like, procedural, functional, high-level) is especially helpful
  • Basic understanding of and interest in internet technologies and fundamental protocols such as HTTP, TCP/IP, and DNS
  • Intellectual curiosity: wanting to know how and why things work, and how to improve the
  • Optimism: seeing obstacles as challenges and problems as ways to make things better
  • Flexibility: ability to handle an environment that shifts (sometimes suddenly) between leisurely and fast-paced
  • Humility: knowing that there is always more to know, and being willing to learn from others
  • Systems thinking: being able to identify the key factors in a system and to reason about the system without needing all the low-level details
  • Safety and security thinking: understanding the difference between random and targeted failures, seeing how things can go wrong (or almost go wrong), and figuring out how to protect against these scenarios
  • Adversarial thinking: understanding the system through the eyes of a party who wishes to disable, destroy, exploit, or just plain mess with it, and being able to convert those insights into ways to increase the resilience of the system against such attacks
  • Hands-on experimentation: being unafraid to try ideas and evaluate their effectiveness
  • Problem framing: being able to identify if the question being asked is the right one, and if not, to be able to ask the right questions
  • Interpersonal skills: getting along with coworkers and colleagues, even when (especially when) incentives encourage an adversarial relationship; knowing who and how to influence; being able to act with diplomacy and tact; and displaying active kindness
  • Perspective: understanding and making tradeoffs; picking battles well; using political capital wisely; and seeing beyond the immediate problem to work towards long-term goals
  • Communication: Expressing oneself clearly, independent of medium (e.g., text, slides, oral presentations), and being able to tailor a message in structure, style, and content to the audience receiving it
38

Cyberphysical Security Researcher Resume Examples & Samples

  • Contribute to IoT security R&D by formulating security research problems for various IoT verticals encompassing endpoints, communication layer, and the cloud
  • Contribute to IoT security/privacy standardization activities (some travel may be required)
  • MS or PhD in Computer Science, Computer Engineering, or related field with proven track record in security for at least one IoT vertical
  • Minimum of 3-4 years of security R&D experience in university during MS or PhD and at least 1 year of IoT vertical related experience either in university or industry
  • Familiarity with sensor data security research. Understanding of security requirements for various IoT verticals such as Connected Car, Industrial Control Systems, Smart Cities
  • Knowledge of cloud and edge network security/privacy concerns
  • Experience in software development on embedded platforms is a plus. Experience in networking protocols and various last mile wireless systems is a plus
39

Senior Security Researcher Resume Examples & Samples

  • A Bachelor’s Degree from an accredited college or university in Computer Science, Computer Security, Information Systems or related discipline and ten (10) years of relevant professional experience and training commensurate with Computer Science, Computer Security and/or Information Systems curriculums
  • 10+ years of experience with research in at least one of the following: Cyber security, reverse engineering, vulnerability research, or exploit development
  • Experience with various network security tools
  • Knowledge of Windows, UNIX or Linux-based operating systems
  • Ability to analyze all-source intelligence material and develop new tactics, techniques, and procedures to meet strategic and operational needs
  • Ability to work with people at all levels
  • *All candidates must be US Citizens to be considered for the position.***
40

Security Researcher, Malware Focus Resume Examples & Samples

  • Masters degree or equivalent years in security trenches
  • Experience with data modeling, graph theory, or machine learning recommended
  • 4 years minimum of real-world security experience
  • Strong understanding of the DNS and HTTP(S), how they function, and how they are used across the Internet
  • Strong knowledge of TCP/IP stack including TCP, UDP, and IP protocols and network traffic analysis
  • Strong understanding of malware communications, botnet architectures, exploit kit delivery techniques
  • Experience with malicious file and code analysis (dissecting PE features, looking at code flow in IDA, stepping through program execution with a debugger, examining system internals, analyzing obfuscated Javascript, Microsoft Office Macros, PDF exploits, etc.)
  • Experience tracking and investigating threats (cybercrime and targeted)
  • Experience at analyzing and mining very large data sets by using existing utilities and writing new tools if needed (i.e. hunting for evil)
  • Programming experience. Python and C/C++ preferred
  • Experience with at least one data storage/database system (preferably experience with relational and non-relational databases)
  • Working knowledge of incident response practices
  • Familiarity navigating and administering Unix systems
41

Senior Security Researcher Resume Examples & Samples

  • You design and drive our new penetration testing program for modality and IT products as well as for cloud services provided by Siemens Healthineers
  • You will engage with our development teams and conduct security development/awareness trainings and you will coach our development teams during implementation with regards to IT security concerns
  • You will perform penetration tests on our products (including but not limiting to Fuzzing, Code-Analysis, Reverse Engineering) to identify security weaknesses prior to delivery
  • You will perform root cause analysis on identified vulnerabilities and support mitigation efforts
  • You will engage with our global business partners and build a strong partnership network for IT security
  • You will drive research activities related to IT security for our product portfolio
  • You will host IT security challenge events, e. g. capture the flag events
  • You have successfully completed your education or equivalent studies in engineering or computer sciences, preferably with a major in IT security
  • You have several years of work experience in the field of IT security, preferably with regards to mission critical infrastructure and you own expert knowledge of security controls for networks, systems and applications to ensure confidentiality, integrity and assurance of proprietary information
  • You can demonstrate experience in network, systems and applications penetration testing and vulnerability assessment
  • You are firmly familiar with Windows and Linux operation systems
  • You are willing to learn about the fascinating healthcare environment or preferably bring first insides about our industry with you
  • You are open minded and wish to work in a global and intercultural environment aswell as cross-functional teams
  • Your spoken and written English skills meet negotiation standard, good German language skills are a plus
42

Security Researcher Resume Examples & Samples

  • A minimum of a Bachelor's Degree in an engineering or related discipline from an ABET accredited university
  • A minimum of 5 years of experience in related areas such as: security research, system exploitation, cyber security engineering; Position level will be dependent on level of education, years of experience, knowledge, skills and abilities
  • Strong technical, communication and analytical abilities
  • Ability to produce timely, logical and concise work products
  • Competent with Microsoft Office products
  • Ability to handle concurrent programs
  • Ability to work effectively independently, in a team or collaborative environment
  • Security research experience
  • Knowledge of IoT microcontrollers and devices
  • Master of Science degree in Computer Science, Computer Engineering, Electrical Engineering or related field from an ABET accredited university
  • Experience with secure embedded architecture designs
  • Ability to learn new technologies or concepts quickly to adapt and adjust to the changing cyber threat landscape
  • Binary analysis of "unknown" origin or type (e.g. Malware/Exploit analysis)
  • Capable of conceptualizing, defining, and implementing security systems and architectures
  • Capable of designing and configuring security tools and intrusion detection systems
  • Capable of executing security certification test/demonstrations/evaluations, documenting results, developing reports, conclusions, and recommendations
  • CISSP, CISA, CISM, or similar certification
  • Clear oral, and written communications capabilities to both technical and non-technical audiences
  • Experience with Network protocols analysis
  • Experience with Device drivers
  • Experience with embedded systems analysis
  • Experience with any combination of the following: cryptography algorithms and implementation, FPGA and/or ASIC design and verification, communication protocols at chip, board, and system levels, co-design and integration of software and hardware, IP cores, system-on-chip design and verification
  • Familiarity with hardware trust anchors, TPM, and/or trust zone solutions
  • Familiarity with tools such as WinDbg/Wireshark/IDA-Pro/OllyDbg/Immunity/Python
  • Experience with Kernel/user mode debugger technologies
  • Knowledge of developing embedded processors through the complete design-cycle from requirement analysis, design, implementation, integration, and testing
  • Experience with Operating systems internals (i.e. OS primitives & Application Binary Interface)
  • Proficiency with cryptography, computer and/or network security is necessary, as well as experience with project management, software engineering and/or consulting
  • DVP&R experience
43

Security Researcher Resume Examples & Samples

  • Design implementable methods to identify and overcome threats using Akamai's data and platform
  • Contribute to security communities through papers, blogs, and presentations
  • 4 years minimum of real-world security experience, including tracking and investigating cyber threats
  • Extensive coding and scripting capabilities in Python or similar, and in SQL
  • Creative, innovative, versatile individual, willing and able to explore new territories and solve hard problems
  • Highly responsible, self-disciplined, self-managed, self-motivated, able to work in a fast paced, results oriented environment
  • Experience with data mining or machine learning — a major advantage
44

Senior Systems Security Researcher / Engineer Resume Examples & Samples

  • Malware analysis and reverse engineering for (preferably) both mobile and non-mobile environments
  • IoT and cloud security
  • Web-site defacement prevention
  • Novel approaches for improving and applying static and dynamic analysis, and reverse engineering
  • Red/white team exercises and cyber range operations such as user, network, and systems modeling
  • The candidate is also expected to regularly interact with senior management on matters concerning several functional areas and/or customers
  • Provide subject matter expertise, vision, and hands-on g to the guidance to the junior members of the team
  • Deliver thought leadership and overall direction and roadmap to the vulnerability discovery, assessment, and exploitation areas
  • Provide a written summary of the work, and also present the work to the senior leadership
  • Be familiar with the existing tools and methodologies used for systems assessments and exploitations, and also create new tools, if needed
  • Extract relevant information from the dark and deep web, and create statistical models of users, networks, systems, and adversaries
45

Senior Security Researcher Resume Examples & Samples

  • Lead efforts to build and use automation, machine learning and the cloud to scale-out impact
  • Work with other internal and external teams to forge new and improve existing partnerships that help mature the product
  • Provide exemplary leadership in an exceptionally challenging and rewarding environment and influence the organization
  • Collaborate with researchers, coordinators and developers to improve the protection capabilities of the products
  • Make good, timely and practical decisions with moderate uncertainty or pressure on a consistent basis
  • BS in Computer Science or Computer Engineering, or at least 10+ years of comparable industry experience
  • Strong research skills, data knowledge, and ability to analyze and present complex data visually in a meaningful way
46

Senior Security Researcher Resume Examples & Samples

  • Participates in testing, documentation and certification of the software
  • Is involved in design phase of new features
  • Conducts code reviews of existing features
  • Interfaces with corporate security teams for the engineering teams
  • Triages security issues and applies threat ratings
  • Demonstrates security expertise internally as well as in customer facing communication
  • Designs, modifies, develops, writes and supports product level software
47

Cyber Security Researcher Resume Examples & Samples

  • Innovate and collaborate with university, external organization partnerships and internal stakeholders to develop emerging cyber security solutions to align with NIST security framework core function to detect advanced cyber threats
  • Research and develop emerging cyber security solution to integrate with business IT functions and leverage on ITRMS cyber security strategy to enable business innovation
  • Present new cyber security research at conferences and at stakeholder meetings as desired
  • Assist to build machine learning models and predictive analytics to categorize, block and remediate targeted attacks and advanced persistent cyber security threats
  • Assist to build machine learning models and predictive analytics to identify sensitive data leakage or possible theft of MSD intellectual property, particularly around MSD’s Critical Applications List
  • Perform security analysis and present analysis through use of Log management tool such as Splunk, SIEM
  • Assist to create a standard set of requirements, technical designs, recommended configurations and drawings necessary to design, implement and deploy our current and future state security capabilities
  • Education: BS in Information Security, Computer Science or Engineering or equivalent experience
  • Minimum of 5 years’ experience in IT, with 1 year in information security and 1 year in cyber security research
  • Present cyber security topics in security conferences and publish cyber security research articles
  • Research and engineer novel solutions with emerging technologies to combat computer security threats
48

Security Researcher & Validation Expert Resume Examples & Samples

  • Threat assessment, vulnerability assessment, evaluation of security validation and threat/vulnerability analysis tools
  • Ensures that software products conform to secure development standards and specifications
  • May participate in development of intellectual property
  • Requires thorough knowledge of security practices, procedures and security analysis tools in order to perform non-repetitive, analytical work
  • Maintains a deep level of expertise in at least one technical domain e.g., open source SW security, cloud security, web application security
  • Provides/contributes to thought leadership in this area
49

Senior Offensive Security Researcher Resume Examples & Samples

  • Perform 0-day research on open and close source software
  • Weaponize memory corruption vulnerabilities
  • Research new threats, attacks and risks to Salesforce systems and software
  • Evangelize security policy and best practice within and outside of Salesforce
  • Required Qualifications
  • Experience with memory corruption exploitation
  • Experience coding C/C++ projects
  • Foundational knowledge in Operative Systems
  • Experience with reversing tools (OllyDbg, IDA Pro, gdb, WinDbg...)
  • Experience with x86, x64 and ARM architectures
  • Experience writing fuzzing tools
  • Desired Skills and Credentials
  • Experience in some scripting language (Perl, Python,Ruby, ...)
  • Ability to self motivate when given strategic goals
50

Security Researcher Resume Examples & Samples

  • Help maintain the database vulnerability scan engine and extend its feature set
  • Author checks and knowledgebase articles for our vulnerability scanning technology
  • Research database security issues
51

Cyberthreat Security Researcher / Developer Resume Examples & Samples

  • Experience with software development in multiple programming languages
  • Experience with programming and advanced Regular Expression development, including PCRE or other
  • Experience in working with big data technologies, including Splunk a plus
  • Experience with using or creating Web services and API’s built on SOAP or REST and using XML or JSON
  • Knowledge of network and system exploitation tools or penetration testing
  • Ability to extrapolate trends and offer predictive insights
  • BA or BS degree in Engineering or CS
  • Experience with scripting languages, including Python, Perl, or Ruby a plus
  • Experience with analyzing or testing threats to multiple technology platforms
  • Experience with Web–based software development a plus
  • Experience with all source intelligence analysis or creating intelligence tradecraft
  • Ability to manage multiple assignments, adjust priorities, and meet deadlines based on mission requirements
  • Ability to show a proven track record of innovative ideas and implement them
  • Registered Private Investigator (PI)
52

Security Researcher Principal Lead Resume Examples & Samples

  • Work closely with our engineers to deliver code across our platform
  • 12 years of relevant experience and a Bachelor’s degree {add Degree info here} or its equivalent or
  • 8 years of relevant experience and a Master’s degree {add Specific Degree here} or
  • 5 years of relevant experience and a PhD {add Specific Degree here}
  • 8+ years experience applying web-based application layer attacks and defenses such as those covered by the OWASP top 10
  • 8+ years experience analyzing source code for vulnerabilities
  • Must be able to communicate clearly and effectively verbally and in writing to both technical and business audiences
  • Highly Desired
  • Coursework in computer science, mathematics, or engineering
  • Experience with applied statistics using R or MATLAB
  • Experience authoring applications using several different web-based application frameworks
  • Experience in at least one of: Haskell, OCaml, F#, ML, Scala, Clojure, Common Lisp, Scheme, Opa, or Erlang
  • Nice to Have
  • Successful completion of web security challenges such as those on HackThisSite.org, OWASP’s Web Goat, or Google’s Gruyere
  • History of responsible vulnerability disclosure
  • Some knowledge of Systems-Theoretic Accident Modeling and Processes (STAMP)
  • Familiarity with security technologies, processes, and concepts such as symmetric and asymmetric cryptography, TLS, Authentication and Authorization, Static Code Analysis
53

Senior Security Researcher Resume Examples & Samples

  • Lead efforts to build and use automation, machine learning and the cloud (scale-out impact) to provide protection to customers
  • Enhance researcher productivity by providing advanced tooling and research access to automation
  • 7+ years of program management experience
  • Strong understanding of customer needs and knowledge of security landscape
54

Lead Security Researcher Resume Examples & Samples

  • Develop standards, development best practices, reference implementations, and testing modules used by the rest of the business for the area of responsibility
  • Select, deploy, and support tools using Agile processes which are used by HBT users including static code analysis, vulnerability scanning, and exploit validation across our entire portfolio ranging from embedded devices through mobile applications to cloud-based services
  • Train and build practice knowledge within the Product Security team
  • Participate in select, high-profile assessments, demonstrations, and validations where advanced skills are needed
  • Key participant in selecting, integrating, and deploying security features within MCUs and application processors
55

Security Researcher Resume Examples & Samples

  • Conduct research and lead research collaborations that yield new insights, theories, analyses, data, algorithms and prototypes and that advance state-of-the-art of malware protection
  • BS in Computer Science or Computer Engineering, or at least 10+ years of engineering experience
  • Strong technical and thought leader with skills in various scripting tools and/or C# programming
  • 7+ years of experience in managing complex programs with a strong understanding of customer needs and knowledge of security landscape
56

Senior Security Researcher Resume Examples & Samples

  • Track new trends in the web application security field
  • Engage in community web application security efforts such as OWASP and WASC
  • Research & publish thought-leading research in the field of web application security
  • BA in CS or similar field, or equivalent experience
  • 4+ years experience in a (web application) security research position
  • Proven strong understanding of Internet protocols including HTTP, SSL, TCP, IP
  • Proven experience in building secure internet and web systems and applications
  • Experience with SQL databases, Big Data systems (e.g. Hadoop), and Data Science tools
  • Experience with web application firewall (WAF) concepts and technologies
57

Security Researcher Resume Examples & Samples

  • Assess Veeva’s readiness and responsiveness to security vulnerabilities by identifying innovative infiltration and exfiltration techniques
  • Provide guidance on security trends and new types of vulnerabilities to Engineering and Operations
  • Develop and lead vulnerability reports to closure, develop summary and dashboard reports, and coordinate identification and resolution of issues with partners and management
58

Senior Security Researcher Resume Examples & Samples

  • Work on detailed analysis of the latest insider security threats
  • Design new ways of detecting insider threats
  • Work closely with Data Scientists to get the security analysis incorporated into Splunk software
  • Reverse Engineer advanced threats into detailed attack kill chain
  • Generate datasets based on threat/malware analysis to ensure successful detection of those as well as for demonstrating advanced detection concepts
  • Knowledge sharing with other team members and externally through blogs, security conferences, presentations etc
  • 5+ years of professional experience in Security Research or Analysis
  • Experience in analyzing datasets and exploring security incidents for both network-based and host-based incidents
  • Experience with insider threat detection and analysis
  • Experience in analysis and proactive detection of insider threats
  • Experience with Host/Endpoint Analysis
  • Experience with SIEM tools such as Splunk, HP/ArcSight
  • Understanding open source threat feeds such as CIF, OpenIOC
  • Experience in all the latest trends in security and a regular speaker at Defcon/Blackhat or other security conferences, and have a blog
  • Has played the role of Incident Responder and Security Analyst post-breach
  • Advanced Experience in multiple of the following
59

Lead Senior Security Researcher Resume Examples & Samples

  • Lead a team of data & security researchers dealing with application layer attacks, web bots, WAF protections, DDoS attacks, online fraud and credential abuse attacks
  • Analyze and evaluate new web application security threats, and develop protection mechanisms for Akamai’s WAF, Client Reputation and Bot Manager
  • 5+ years experience in a (web application) security research position
  • Programming skills: web-related languages is a must (PHP, ASP.NET, J2EE, RnR), scripting languages (Python, etc.)
  • Experience with SQL databases
  • Creativity and innovation
  • Self-motivated, independent and able to understand complex systems
  • Bilingual Hebrew/English, verbal and written
  • Experience with Big Data systems (e.g. Hadoop), and Data Science tools
  • Experience with machine learning & related tools/frameworks
  • Experience in web bots related topics - bot detection, device fingerprinting, user behavioral analysis
60

Senior Security Researcher Resume Examples & Samples

  • Proactively identify and characterize new threats, vulnerabilities, and risks to customer security context
  • Apply threat research to create customer protections to include documenting, developing, testing and optimizing security countermeasures
  • Handle and respond to top tier security escalations from our Security Operation Center (SOC) and Consulting teams
  • Produce and deliver intelligence products to internal teams and customers in the form of briefings, reports, and presentations
  • Provide mentorship to Dell SecureWorks team members and customers on security strategy, tactics, techniques, and procedures; and
  • Innovate and execute on short-to-moderate term projects
  • Enhance the CTU and the Information Security community as a whole by public speaking and other service
61

Compiler Security Researcher Resume Examples & Samples

  • Developing new LLVM analysis and instrumentation passes
  • Evaluating the performance of the enhanced compiler on various recent platforms and comparing it to the baseline compiler
  • Developing a new runtime library in compiler-rt
  • Modifying the ELF object file backend to emit additional information
  • Effective communication
  • Agility to quickly adapt to changing requirements that arise due to new research results
  • Good analytical and problem solving skills
  • M.S. or currently enrolled in PhD program for Computer Science, Computer Engineering or related technical discipline
  • Experience developing substantial LLVM compiler enhancements or other modifications
  • Experience with Git
  • 5+ years of C++ experience
  • 3+ years of debugging experience with gdb/lldb/idb
  • 1+ year of IA-32 assembly language experience
  • 3+ years of experience with Linux-based operating systems and development environments, e.g. shell, ssh, and make
  • Security and/or cryptography
  • Experience modifying linker
  • Experience with Linux containers and/or unikernels
  • Experience with virtualization
  • 5+ Years of relevant industry experience
62

Senior Security Researcher Resume Examples & Samples

  • Research and publish thought-leading research in the field of web application security
  • 4+ years of experience in a (web application) security research position
  • Programming skills: web-related languages are a must (PHP, ASP.NET, J2EE, RnR), scripting languages (Python, etc.)
  • Bilingual in Hebrew/English, verbal and written
63

Security Researcher Resume Examples & Samples

  • Define and develop the detection logic of our products using machine learning algorithms
  • Be part of our growing team of security and data experts developing new ways to detect advanced attackers and other network behaviors
  • Become an expert on how networks, endpoints and users really work – theoretically, practically, and mathematically
  • Add your insights into our research process - be a critical member of our decision-making process on which classifiers and detectors we should tackle
  • Must: Knowledge of networking and network security, analyzing network protocols, endpoint interaction with network
  • Understanding of statistics, statistical modelling – big advantage
  • Software development: Fluent in Python, noSQL databases - advantage
  • Familiarity with Windows networking and windows security model, Active Directory managed networks
  • Autodidact, Critical thinker and natural tinkerer
64

Security Researcher Resume Examples & Samples

  • Analyze high profile network attacks/threats
  • Analyze botnets and monitor their activities
  • Discover new zero-day exploits/vulnerabilities
  • Develop protection against network attacks/threats
  • Write security-related blog, paper, etc
  • Stay up-to-date on the latest exploitation/attack techniques
  • Must have 2+ years of security research or vulnerability discovery experience
  • Experience with OllyDbg or equivalent
  • Experience with IDA Pro or equivalent
  • Experience with x86/x64 assembly
  • Experience in reverse engineering
  • In-depth knowledge of OS internals
  • Solid knowledge of programming languages such as C/C++ and Python
  • Solid knowledge of networking and internet protocols such as TCP/IP, DNS, HTTP
65

Senior Security Researcher Resume Examples & Samples

  • 5 years of relevant experience and a Bachelor’s degree in computer science, engineering, mathematics, statistics or equivalent or
  • 3 years of relevant experience and a Master’s degree in computer science, engineering, mathematics, statistics or equivalent or
  • Relevant experience and a PhD
  • 1-2 years experience in at least two programming languages, including a scripting language
  • 1-3 years experence with and interest in Internet technologies and fundamental protocols such as HTTP, TCP/IP, TLS, and DNS
  • 1-2 years experience or familiarity with security technologies, processes, and concepts such as symmetric and asymmetric cryptography, TLS, and Authentication and Authorization
  • 2-3 years successfully writing to technical and business audiences. Must be able to demonstrate clarity, effectiveness and persuasiveness in communications
  • Exposure to a wide range of language types (e.g., scripting, Unix-like, procedural, functional, high-level) is especially helpful
  • Some knowledge of Systems-Theoretic Accident Modeling and Processes (STAMP) and STPA-derived methods
66

Security Researcher Resume Examples & Samples

  • MS/PhD in CS, Mathematics, Physics or BS with equivalent work experience and notable accomplishments
  • Solid practical experience developing with either Python, C/C++, or Java in a *nix environment
  • Solid practical experience working with algorithms and data structures (a big plus for high performance and large scale implementations)
  • Experience using graph theory and machine learning algorithms on real world datasets
  • Passion for solving complex problems and taking initiative
  • A top performer working independently or with a team
  • Experience working with a MapReduce framework (Hadoop, Spark)
  • Experience analyzing terabyte sized datasets using rigorous statistical methods and machine learning techniques such as classification and clustering
  • Experience or interest in cybersecurity and network protocols
  • Research record (papers, talks, etc) and public speaking
  • Familiarity with numpy/scipy stack
  • Github link to your best coding projects
67

Security Researcher Resume Examples & Samples

  • Write, test and maintain Python, C and Assembly codebases (across multiple architectures)
  • Perform embedded reverse engineering (RE), vulnerability research (VR) and application development for software and embedded systems
  • Collaborate with researchers and engineers during Scrum or other Agile framework sessions
  • Promote strict code testing and validation to ensure high-quality coding standards
  • Solve difficult technical problems
  • Experience reverse engineering COTS software, malware or hardware
  • Experience with mobile OS vulnerability research and/or finding vulnerabilities that matter
  • Experience with modern security mechanisms (e.g., CFG, DEP, ASLR)
  • Understanding of one or more operating system internals (user mode and kernel mode)
  • Experience with symbolic analysis engines (e.g., angr)
  • Experience using a version control system such as Git or Mercurial
  • Experience providing, receiving and modifying code based on code reviews
  • Ability to clearly communicate and collaborate with team to deliver high quality deliverables
68

Cyber Security Researcher Resume Examples & Samples

  • Drive and deliver novel applied research results supporting advanced cyber-security in industrial products and solutions
  • Develop network of Siemens-internal resources, including researchers from other teams as well as stakeholders in the Business Units
  • Develop network of external resources, including US government entities, research firms, national labs and universities
  • Identify funding vehicles attractive and relevant to the stakeholders
  • Lead proposal development, organizing contributions from varied stakeholders (in other words, be the PI for one or more projects)
  • Contribute to department portfolio by bringing in funding of $750k per year on a consistent basis
  • MS degree in Computer Science or Computing Engineering, PhD prefered
  • 5+ years experience leading research projects in cyber-security
  • 2+ years project management experience (PMP a plus)
  • 2+ years experience in embedded system or industrial control system design and development
  • Security Data Analytics or Secure DevOps experience a plus
  • Expert programming experience in C and C++
  • Proven ability to leverage a network of peers in order to deliver a novel result
69

Security Researcher / Software Engineer Resume Examples & Samples

  • 3+ years of experience with software development using C/C++ or assembly
  • 2+ years of experience with reverse engineering software using disassemblers and debuggers, including IDA Pro and gdb
  • 1+ years of experience with developing or maintaining software or firmware for iOS, Android, or other embedded, non-x86 platforms
  • Knowledge of computer architecture, including x86, ARM, MIPS, Power PC, or x86_64
  • BS degree in Computer Science or Computer Engineering
  • Experience with hardware debugging or interface methods, including JTAG, UART, or I2C
  • Experience with higher-level languages, including Java, Objective-C, or Python
  • Experience with firmware development, volatile memory manipulation, and software hooking
70

Senior Security Researcher Resume Examples & Samples

  • 5 years of relevant experience and a Bachelor’s degree in computer science, engineering, mathematics, statistics or equivalent OR
  • 3 years of relevant experience and a Master’s degree in computer science, engineering, mathematics, statistics or equivalent OR
  • Relevant experience and a PhD
  • 1-2 years experience in at least two programming languages, including a scripting language
  • 1-3 years experence with and interest in Internet technologies and fundamental protocols such as HTTP, TCP/IP, TLS, and DNS
  • 1-2 years experience or familiarity with security technologies, processes, and concepts such as symmetric and asymmetric cryptography, TLS, and Authentication and Authorization
  • 2-3 years successfully writing to technical and business audiences. Must be able to demonstrate clarity, effectiveness and persuasiveness in communications
  • Excellent technical aptitude and a desire to learn constantly
  • Exposure to a wide range of language types (e.g., scripting, Unix-like, procedural, functional, high-level) is especially helpful
  • Experience authoring applications using several different web-based application frameworks
  • Some knowledge of Systems-Theoretic Accident Modeling and Processes (STAMP) and STPA-derived methods
71

Security Researcher Resume Examples & Samples

  • 3+ years of professional experience within Cloud Security or Security Research role
  • Strong understanding of the DNS, HTTP, etc. protocols and web application security
  • Experience applying Machine Learning to identify security threats
  • Familiarity with Machine Learning & AI algorithms. Hadoop a plus
  • Strong scripting skills, preferably in Python
  • Strong written and presentation skills in English
  • Data mining experience with large security data sets such as IDS, IPS and firewall logs
  • Bachelor’s or Graduate degree from four-year college or university (preferably in Computer Science, Engineering, or related discipline), or equivalent security industry work experience
  • Publication of past research and/or speaking engagements
  • LI-SP1
72

Senior Security Researcher Resume Examples & Samples

  • Research and develop methods of tracking and detecting criminal activity on the Internet
  • Develop tools, signatures and methods of detection for active threats
  • Reverse engineer malware and contribute to our botnet monitoring framework
  • Hunt for unidentified groups posing threats to our clients
  • Experience with large-scale sandboxing operations and technologies (e.g. Cuckoo)
  • Familiarity with the use of memory dumps during the analysis process
  • Understanding of basic cryptographic concepts and common cryptographic algorithms
  • Established relationships with computer industry contacts or trust groups
  • Exploit development
  • Ability to recognize and appropriately handle sensitive data
  • Ability to interface and establish rapport with internal operations
  • Ability to work with little direct oversight
  • LI-MW1
73

Senior IoT Security Researcher Resume Examples & Samples

  • Research into existing and new security technologies
  • Provide security advice and assurance throughout the product development lifecycle and design reviews
  • Performing targeted application vulnerability assessments, and ethical hacking across systems
  • Drive continuous improvement in application/product security and champion changes to the organisation to be able to respond to new threats
  • Lead projects that involve security focused changes to our application architecture
  • Ensure we are aligning with industry recognised Standards and emerging IoT Standards and reference designs
  • BSc/MSc degree in Computer Science, Information Security, other related subject or equivalent experience
  • Strong Experience with IoT and Cloud connectivity and related security techniques
  • Expert knowledge of security methodology and frameworks
  • Ability to work well under minimal supervision and with a high degree of autonomy and responsibility
  • Team-oriented interpersonal skills, with the ability to communicate effectively with a broad range of people and roles, including vendors, IT and business personnel
74

Applied Security Researcher Resume Examples & Samples

  • Provide detection and analysis integration support to multiple FireEye service lines
  • Research threats and integrate GSI threat knowledge into global detection techniques
  • Maintain expert knowledge of forensics and incident response practices as well as advanced persistent threat tools, techniques, and procedures (TTPs)
  • Establish standards and processes for GSI detection creation and management
  • Provide support to global service delivery for Mandiant and FireEye as a Service investigations
  • Monitor FireEye technology stacks for threat discovery and new detection viability
  • Drive innovation and rapidly prototype new tools and methodologies
  • Author new detections and analysis techniques used to find evil across GSI technology stacks
  • Develop tactical detections to rapidly discover new compromises during high-severity cyber attacks impacting FireEye customers globally
  • Cross-coordinate detection and analysis techniques between GSI internal teams
  • Excellent communication and presentation skills with the ability to exchange information with technical and non-technical audiences
  • Strong leadership skills with the ability to prioritize and execute
  • Strong problem solving, troubleshooting, and analysis skills
  • Experience working in fast-paced development environments
  • Excellent interpersonal and teamwork skills
  • Self-driven, proactive, hardworking, creative team-player with a good sense of humor
75

Senior Cyber Security Researcher Resume Examples & Samples

  • Lead efforts and work with GTRI security practitioners to develop novel solutions for security operations
  • Lead sponsor engagement and contribute to research proposals
  • Analyze both operational and technical requirements for complex systems
  • Work with GTRI researchers in novel machine and deep learning techniques
  • Devise security approaches for cyber-physical systems, including hardware roots of trust
  • Support software and cloud security development
  • Assist in developing strategy CIPHER Lab research portfolio