Are you interested in producing actionable intelligence on cyber threats ?
Join the Threat Detection & Research team and help them enhance the Sekoia.io platform’s capabilities, ultimately better protecting our partners and customers.
To strengthen the investigation and detection capabilities of this TDR team, we are looking for a Senior Technical Analyst whose role will involve :
Conducting technical investigations leading to the discovery and analysis of malicious code and attack infrastructures associated with known or unknown clusters of activity.
Writing reports, blog articles, and attending international conferences to present your investigations and research to different types of audiences (expert or not).
Analysis of malicious code targeting different operating systems and creation of detection rules, particularly using YARA, Sigma and Suricata tools.
Technical supervising of some of the TDR team’s productions, whether in analyzing malicious code or infrastructure or drafting and structuring their reports.
Enhancing open source publications to track threats, discover new indicators, and feed our Sekoia SOC Platform system with new IOCs and rules.
Implementing new tools to detect and track threats within the technical ecosystem implemented by the TDR team.
Cooperation with CERTs/CSIRTs/LEAs and other threat research teams.
📍 The position can be based in Paris, Rennes or fully remote.
🤩 We are excited to meet you if :
At least 5 years experience in the technical study of adversarial modus operandi, CERT/CSIRT, or offensive security (private and/or public);
Malicious code analysis skills (beginner level accepted);
Skills in analysing attack infrastructures (C2s, ORBs, etc.);
Skills in producing YARA, SIGMA and SNORT signatures;
Writing skills in English and French;
Python development skills in a professional context;
Good knowledge of network protocols and operating systems;
Working experience with Maltego, IDA, Ghidra, VirusTotal, Censys, Shodan etc. ;
Development of tools in a professional context (documentation, git, etc.);
Knowledge of cyber modelling (ATT&CK, STIX, Kill Chain, etc.);
Personal interest in international relations and geopolitics and good general knowledge and IT security watch;
Little extras that will make your application stands out :
At least one forensic experience outside the Windows scope (Mac, embedded system, smartphone);
Good knowledge of at least one major threat actor targeting the Western world (Russia, China, North Korea, Iran, etc.) or in organised cybercrime (RaaS etc.);
Full-stack development of simple applications (JavaScript ES6, Python Flask, etc.);
Experience in red-teaming offensive security or Good reverse engineering skills, ideally using IDA;
Technical OSINT skills;
Creativity in the approach to threat hunting.
Being comfortable using LLMs (Large Language Models) in a technical context;
👀 Are you interested in this job but feel you haven’t ticked all the boxes? Don’t hesitate to apply, and tell us in the cover letter section why we absolutely must meet!
📝 Here’s what’s in store for you if you apply :
HR Interview with Clémentine, Talent Acquisition Manager (45’)
N+1 Interview with Nicolas, Head of Threat Detection & Research (TDR) team (60’) + ask for examples of publications (reports, conference)
Skills fit with Senior Threat Researchers of the TDR team (60’)
Final step with François, Chief Intelligence Officer (30’)
Our process usually takes about 3 weeks depending on availability, it includes reference calls.
The program: discussions rather than trick questions ! These discussions will help you understand howSekoia.io works and what it stands for. But they are also (and above all) an opportunity for you to tell us about your career path and your expectations for your next job!
⭐ Sekoia.io is an equal opportunity employer for any minority, disability, gender identity or sexual orientation. We are committed to hiring and supporting diverse teams of people from all backgrounds, experiences, and perspectives.
Ces entreprises recrutent aussi au poste de “Information Security”.