We are looking for a Software Research Engineer to join our Operational Technology Content team.
In this role, you will take part in protecting our customers' OT environments from a wide range of cyber threats.
Your contributions will be directly impactful, not only ensuring our customers' success but also making a significant difference in the evolving landscape of OT security.
Your Opportunity:
Research OT/IoT threats, malware and exploitation tools
Develop effective threat detection rules and enhance our product's capabilities for better threat detection
Research newly published vulnerabilities and security advisories in order to develop new detection plugins for our OT Security product
Research, develop and improve methods of detection for currently unsupported OT/IoT devices
In this role, you will take part in protecting our customers' OT environments from a wide range of cyber threats.
Your contributions will be directly impactful, not only ensuring our customers' success but also making a significant difference in the evolving landscape of OT security.
Your Opportunity:
Research OT/IoT threats, malware and exploitation tools
Develop effective threat detection rules and enhance our product's capabilities for better threat detection
Research newly published vulnerabilities and security advisories in order to develop new detection plugins for our OT Security product
Research, develop and improve methods of detection for currently unsupported OT/IoT devices
Requirements:
What you'll need:
In depth understanding of threat detection and exploitation techniques especially for OT/IoT devices
Strong experience with network analysis and threat detection software such as Suricata
Knowledge in protocol analysis
Knowledge in security assessment such as pentest, bug bounty or CTF
Robust programming skills
Ability to self-educate and keep up to date with current security trends and exploitation methods
Strong attention to detail and able to frequently shift priorities as needed
Good written and verbal communication skills
And ideally:
B.S. degree in Computer Science or a related field
2+ years of development experience
Experience in systems administration and open source tools
What you'll need:
In depth understanding of threat detection and exploitation techniques especially for OT/IoT devices
Strong experience with network analysis and threat detection software such as Suricata
Knowledge in protocol analysis
Knowledge in security assessment such as pentest, bug bounty or CTF
Robust programming skills
Ability to self-educate and keep up to date with current security trends and exploitation methods
Strong attention to detail and able to frequently shift priorities as needed
Good written and verbal communication skills
And ideally:
B.S. degree in Computer Science or a related field
2+ years of development experience
Experience in systems administration and open source tools
This position is open to all candidates.