Technical Threat Researcher

Permanent contract
Paris, Rennes
Fully-remote
Salary: Not specified
Experience: > 3 years

Sekoia.io
Sekoia.io

Interested in this job?

Questions and answers about the job

The position

Job description

Are you interested in producing actionable intelligence on cyber threats ?

Join the Threat Detection & Research team and help them enhance the Sekoia.io platform’s capabilities, ultimately better protecting our partners and customers.

Your missions :

To strengthen the investigation and detection capabilities of this TDR team, we are looking for a Senior Technical Analyst whose role will involve :

  • Conducting technical investigations leading to the discovery and analysis of malicious code and attack infrastructures associated with known or unknown clusters of activity.

  • Analysis of malicious code targeting different operating systems and creation of detection rules, particularly using YARA and Sigma.

  • Writing reports, blog articles and attending international conferences to present your investigations and research to different types of audiences (expert or not).

  • Technical supervising of some of the TDR team’s productions, whether in analysing malicious code or infrastructure or drafting and structuring their reports.

  • Enhancing open source publications to track threats, discover new indicators and feed our Sekoia SOC Platform system with new IOCs and detection rules.

  • Implementing new tools to detect and track threats within the technical ecosystem implemented by the TDR team.

  • Cooperation with CERTs/CSIRTs/LEAs and other threat research teams.

📍 The position can be based in Paris, Rennes or fully remote. Professional trips paid for by the company might be required.


Preferred experience

🤩 We are excited to meet you if :

  • You have at least 3 years of experience in the technical study of adversarial modus operandi, CERT/CSIRT, SOC, IR or offensive security;

  • You have good knowledge of Cloud environments, network protocols and operating systems;

  • You have experience in analysing attack infrastructures (C2s, ORBs, etc.);

  • You have experience in producing YARA and SIGMA signatures;

  • You have Python development skills;

  • You are fluent in both French and English;

  • You have a good knowledge in at least one organised cybercrime (RaaS, IAB) or at least one major threat actor targeting the Western world (Russia, China, North Korea, Iran, etc.);

  • You know how to work autonomously and suggest novel angles of investigation.

Bonus points ☘️ :

  • Experience in one of these fields: red-teaming offensive security, reverse engineering or forensics;

  • Knowledge of cyber modelling (ATT&CK, STIX, Kill Chain, etc.);

  • Malicious code analysis skills (beginner level accepted);

👀 Are you interested in this job but feel you haven’t ticked all the boxes? Don’t hesitate to apply, and tell us in the cover letter section why we absolutely must meet!


Recruitment process

📝 Here’s what’s in store for you if you apply :

  1. HR Interview with Clémentine, Talent Acquisition Manager (30’)

  2. N+1 Interview with Nicolas, Head of Threat Detection & Research team (60’)

  3. Skills fit with 2 Senior Threat Researchers of the TDR team (60’)

  4. Final step with François, Chief Intelligence Officer (30’)

Our process usually takes about 3 weeks, depending on availability, it includes reference calls. The program: discussions rather than trick questions ! These discussions will help you understand how Sekoia.io works and what it stands for. But they are also (and above all) an opportunity for you to tell us about your career path and your expectations for your next job!

Sekoia.io is an equal opportunity employer for any minority, disability, gender identity or sexual orientation. We are committed to hiring and supporting diverse teams of people from all backgrounds, experiences, and perspectives.

Want to know more?

These job openings might interest you!

These companies are also recruiting for the position of “Cybersecurity”.