Lookout logo
Lookout

The endpoint to cloud security company purpose-built for the intersection of enterprise and personal data.

Staff Threat Intelligence Researcher

Threat Intelligence SpecialistSecurity AnalystFull TimeRemoteTeam 501-1,000Since 2007H1B SponsorCompany SiteLinkedIn

Location

United States

Posted

8 days ago

Salary

Not specified

No structured requirement data.

Job Description

This description is a summary of our understanding of the job description. Click on 'Apply' button to find out more.

Role Description

We are looking for a Staff Security Researcher to join our Threat Intelligence team, a group of top-tier security researchers working to identify, investigate, and track targeted attacks on users of mobile devices. As a member of this team you will use an extensive arsenal of detection tools including the largest collection of mobile apps containing 200M+ Android and iOS apps to find and research mobile malware and hunt down malicious actors, their infrastructure, tooling and techniques.

  • Identify, analyze and track advanced nation state and financially motivated threat actors and their tactics, techniques, and procedures (TTPs).
  • Develop strategies to hunt mobile threats targeting enterprises and individuals.
  • Reverse-engineer and analyze capabilities of mobile malware.
  • Investigate adversary command-and-control and phishing infrastructure.
  • Conduct independent research and report findings to Threat Intelligence customers.
  • Mine internal and external data sources to identify new campaigns, malware families, and malicious actors.
  • Devise and implement new detection rules and develop innovative and efficient ways to expand and finetune coverage.
  • Prepare and deliver public media reports and present findings at conferences.
  • Participate in activities involving customers, prospects, and partners.

Qualifications

  • Experience in threat hunting across multiple datasets, security tools such as VirusTotal, Validin, and Shodan and leveraging big data technologies (e.g., Lucene, ElasticSearch, AWS Athena).
  • Experience in reverse engineering software (mobile app reversing preferred).
  • Ability to articulate technical findings both in written reports and presentations.
  • Experience using some of the following tools: JEB, IDA Pro, Ghidra, Hopper, Frida, Wireshark, DirBuster.
  • Ability to read code in Java and C; ARM Assembly, ObjectiveC and Swift is a bonus.
  • Experience in conducting OSINT investigations.
  • Ability to create research tools in Python.
  • Experience with threat intelligence file types, tools and terminology such as MITRE ATT&CK, STIX, YARA, MISP, OpenCTI and the Intelligence Cycle.
  • Interest in geopolitical dynamics and the ability to apply that context to inform intelligence analysis and threat hunting activities.
  • Curiosity and a strong drive to understand how both state and criminal actors operate.

Benefits

  • Base salary range: $130,000 — $149,000 USD.
  • Base + bonus + equity + benefits.
  • Individual pay determined by work location and additional factors, including job-related skills, experience, and relevant education or training.

Company Description

Lookout, Inc. is the endpoint to cloud security company purpose-built for the intersection of enterprise and personal data. We safeguard data across devices, apps, networks and clouds through our unified, cloud-native security platform — a solution that's as fluid and flexible as the modern digital world. By giving organizations and individuals greater control over their data, we enable them to unleash its value and thrive. Lookout is trusted by enterprises of all sizes, government agencies and millions of consumers to protect sensitive data, enabling them to live, work and connect — freely and safely.

To learn more about the Lookout Cloud Security Platform, visit www.lookout.com and follow Lookout on our blog , LinkedIn and Twitter .

Job Requirements

  • Experience in threat hunting across multiple datasets, security tools such as VirusTotal, Validin, and Shodan and leveraging big data technologies (e.g., Lucene, ElasticSearch, AWS Athena).
  • Experience in reverse engineering software (mobile app reversing preferred).
  • Ability to articulate technical findings both in written reports and presentations.
  • Experience using some of the following tools: JEB, IDA Pro, Ghidra, Hopper, Frida, Wireshark, DirBuster.
  • Ability to read code in Java and C; ARM Assembly, ObjectiveC and Swift is a bonus.
  • Experience in conducting OSINT investigations.
  • Ability to create research tools in Python.
  • Experience with threat intelligence file types, tools and terminology such as MITRE ATT&CK, STIX, YARA, MISP, OpenCTI and the Intelligence Cycle.
  • Interest in geopolitical dynamics and the ability to apply that context to inform intelligence analysis and threat hunting activities.
  • Curiosity and a strong drive to understand how both state and criminal actors operate.

Benefits

  • Base salary range: $130,000 — $149,000 USD.
  • Base + bonus + equity + benefits.
  • Individual pay determined by work location and additional factors, including job-related skills, experience, and relevant education or training.

Related Job Pages

More Threat Intelligence Specialist Jobs

Alcoma logo

Strategic Intelligence Analyst

Alcoma

We Care. We Collaborate. We Deliver.

Threat Intelligence Specialist8 days ago
Part TimeRemoteTeam 11-50Since 1996H1B No Sponsor

Strategic Intelligence Analyst providing geopolitical insights for investment analysis at Alcoma.

United States
$50 - $90 / hour
Vantor logo

Cybersecurity Threat Intelligence Analyst

Vantor

Vantor is forging the new frontier of spatial intelligence to unlock a more autonomous, interoperable world. We empower decision makers and operators with the clarity they need to navigate what’s happening now and shape what’s coming next. Our AI-powered spatial intelligence platform fuses data from the world’s highest-resolution satellites with real-time sensor feeds from space, air, and ground to create the most accurate living digital replica of Earth.

Threat Intelligence Specialist9 days ago
Full TimeRemoteTeam 1,001-5,000Since 1969

Analysts will collaborate to identify and understand threats to Company by investigating security events using various toolsets and responding to cyber threats within Company environments. Key duties include writing and compiling threat research documents, communicating findings to technical and executive teams, and researching emerging Indicators of Compromise.

Threat IntelligenceOSINTIncident ResponseMalware AnalysisNISTCISOWASPSecurity+CISSPCEH
United States
$102K - $188K / year
Global Elite Empire Consultants logo

Competitive Individuals Wanted - Remote Sales Opportunity

Global Elite Empire Consultants

Good Grief is focused on building a competitive remote sales team.

Threat Intelligence Specialist9 days ago
Full TimeRemoteTeam 2-10

Remote sales opportunity. Entry-level applicants welcome. Training provided. Commission-based income. We don't hire based on resumes; we hire based on work ethic. No degree required. Open to career changes. Interview within 48 hours. Good Grief is building a remote sales team mad...

United States
BioCatch logo

Associate Threat Analyst

BioCatch

We fight to make banking safer every day.

Threat Intelligence Specialist9 days ago
Full TimeRemoteTeam 201-500Since 2011

Key responsibilities include building internal relationships with the partner network team, providing basic training to partner customers, and supporting the technical implementation of streamlined partner onboarding processes. The role also involves designing automation to improve scalability across the partner channel and supporting immediate fraud attack responses.

SQLPythonMachine Learning
United States