HamburgerMenu
hirist

Security Researcher - Malware Analysis

Indus face Private Limited
Anywhere in India/Multiple Locations
3 - 7 Years
star-icon
4white-divider43+ Reviews

Posted on: 13/09/2025

Job Description

Job Details :


Role : Security Researcher


Experience : 3 to 7+ years (depending on level)


Location : Flexible (Onsite/Hybrid/Remote as per business need)


Employment Type : Full-time


We are looking for a highly skilled and motivated Security Researcher to join our cybersecurity team.

The ideal candidate will have strong expertise in vulnerability research, exploit development, malware analysis, and threat intelligence.

This role involves identifying security weaknesses, analyzing advanced threats, and contributing to the design of more secure systems and applications.

The Security Researcher will work closely with security engineers, developers, and incident response teams to ensure robust protection against emerging cyber risks.


Key Responsibilities :


Vulnerability Research & Exploit Development :

- Identify and analyze vulnerabilities in operating systems, applications, and network protocols.

- Develop proof-of-concept (PoC) exploits to validate vulnerabilities.

- Research novel attack vectors and advanced exploitation techniques.


Threat Intelligence & Malware Analysis :

- Analyze malware samples, reverse-engineer binaries, and understand attacker tactics.

- Monitor and assess evolving cyber threats, APT campaigns, and zero-day exploits.

- Provide actionable intelligence to improve defensive measures.


Security Tooling & Automation :


- Develop scripts and tools to automate vulnerability discovery and analysis.

- Contribute to open-source security projects and internal research tools.

- Perform fuzzing, static, and dynamic analysis of software.


Collaboration & Reporting :


- Work with developers and product security teams to recommend mitigations.

- Collaborate with incident response and SOC teams for advanced threat detection.

- Document and present findings in detailed technical reports and research papers.


Required Skills & Qualifications :


- Bachelors/Masters degree in Computer Science, Cybersecurity, or equivalent practical experience.

- 3 to 7+ years of experience in vulnerability research, exploit development, or malware analysis.

- Strong knowledge of operating system internals (Windows, Linux, Android, iOS).

- Hands-on experience with reverse engineering tools (IDA Pro, Ghidra, Radare2, OllyDbg).

- Expertise in low-level programming (C, C++, Assembly) and scripting (Python, PowerShell, Bash).

- Knowledge of network protocols, cryptography, and secure coding practices.

- Familiarity with penetration testing frameworks (Metasploit, Burp Suite).

- Strong debugging, fuzzing, and exploit development skills.


Preferred Skills :


- Experience with cloud security research (AWS, Azure, GCP).

- Contributions to CVE research, security advisories, or open-source projects.

- Knowledge of machine learning in threat detection.

- Publications in security conferences, blogs, or industry journals.


What We Offer


- Opportunity to work on cutting-edge security challenges and zero-day research.

- Collaborative environment with top industry security professionals.

- Competitive compensation and benefits.

- Training, certifications, and conference sponsorships (Black Hat, DEF CON, etc.


info-icon

Did you find something suspicious?