Security Engineer III - Threat Research @ ExtraHop | Jobright.ai
JOBSarrow
RecommendedLiked
0
Applied
0
Security Engineer III - Threat Research jobs in United States
200+ applicants
expire-info-iconThis job has closed.
company-logo

ExtraHop · 3 days ago

Security Engineer III - Threat Research

Wonder how qualified you are to the job?

ftfMaximize your interview chances
AnalyticsCyber Security

Insider Connection @ExtraHop

Discover valuable connections within the company who might provide insights and potential referrals, giving your job application an inside edge.

Responsibilities

Reproduce and analyze network-based cyber attacks, including vulnerability exploitation and lateral movement.
Communicate in writing research findings and collaborate in writing detectors to detect cyber attacks.

Qualification

Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.

Network securityNetworking basicsOSI modelProtocolsIPTCPUDPHTTPPenetration testingRed teamingCapture the flagVulnerability exploitationWiresharkTSharkPythonScripting languagesCommunicationThreat ResearcherPenetration TesterDetection EngineeringVulnerability ResearcherMITRE ATT&CK FrameworkVMContainer technologiesWindows protocolsReconnaissanceLateral movement techniquesR&D Employees-person events

Required

Bachelor’s degree or equivalent experience in cyber security, computer science, engineering, or network forensics.
Strong understanding of network security and networking basics, including the OSI model and excellent working knowledge of the key protocols from Layer 2 through Layer 7, including IP, TCP, UDP, and HTTP.
Experience in penetration testing, red teaming, or capture the flag competitions that include hands-on execution of attacks and vulnerability exploitation.
Good communication skills with the ability to clearly communicate in writing technical details about attacks.
Strong working experience in using Wireshark, TShark, or other network analysis tools.
Strong working experience with Python or equivalent scripting languages.

Preferred

3+ years of professional experience as a Threat Researcher, Penetration Tester, Detection Engineering, or Vulnerability Researcher.
Familiarity with MITRE’s ATT&CK Framework.
Familiarity with VM and container technologies for setting up ephemeral environments for research.
Familiarity with Windows protocols and reconnaissance and lateral movement techniques in Windows environments.
All R&D Employees will be required to attend 2 mandatory in-person events every year of approx. 4 days duration.

Benefits

Health, dental, and vision benefits
Honor System PTO and 9 Holidays (US only) + 3 Days of Paid Volunteer Time
Non-Commissioned positions are eligible to participate in annual discretionary bonus plan
FSA and Dependent Care Accounts + EAP where applicable
Educational Reimbursement
401k with employer match or Pension where applicable
Pet Insurance (US only)
Parental Leave (US Only)
Hybrid and Remote Work Model

Company

ExtraHop

company-logo
We’re on a mission to reveal cyber risk and build business resilience by exposing the threats organizations can’t see.

Funding

Current Stage
Growth Stage
Total Funding
$161.6M
Key Investors
TCVMeritech Capital PartnersMadrona
2024-01-09Private Equity· $100M
2021-06-08Acquired· by Bain Capital Private Equity ($900M)
2014-05-29Series C· $41M

Leadership Team

leader-logo
Jeff Costlow
Deputy CISO
linkedin
leader-logo
Sharat Nautiyal
Senior Cybersecurity Architect and Tech Evangelist
Company data provided by crunchbase
logo

Orion

Your AI Copilot