3 Easy Steps

  • 1Search for courses by Study Area, Level and Location
  • 2We deliver you all the matched results
  • 3Choose one or more course providers to contact you

Distance from location (kms)

Exact 5 10 25 50 100

Posted since

All 2 Days 1 Week 2 Weeks 1 Month

Sort results by

Relevance Date



Staff Threat Research Engineer

Netskope - Melbourne, VIC

Source: uWorkin


About Netskope

Today, there’s more data and users outside the enterprise than inside, causing the network perimeter as we know it to dissolve. We realized a new perimeter was needed, one that is built in the cloud and follows and protects data wherever it goes, so we started Netskope to redefine Cloud, Network and Data Security.

Since 2012, we have built the market-leading cloud security company and an award-winning culture powered by hundreds of employees spread across offices in Santa Clara, San Francisco, Seattle, Bangalore, London, Melbourne, and Tokyo. Our core values are openness, honesty, and transparency, and we purposely developed our open desk layouts and large meeting spaces to support and promote partnerships, collaboration, and teamwork. From catered lunches and office celebrations to employee recognition events and social professional groups such as the Awesome Women of Netskope (AWON), we strive to keep work fun, supportive and interactive. Visit us at Netskope Careers and follow us on Twitter @Netskope and Facebook.

About The Role

You will be a member of Netkope’s Threat Research Team, a team of security researchers and subject matter experts working together to solve today’s security challenges in new and innovative ways. The primary output of the Threat Research Team is thought leadership; blog posts, conference presentations, webinars, and podcasts. The Threat Research Team also works closely with the security, data science, product, and engineering teams to develop novel protection strategies against emerging cybersecurity threats.

As a member of the Threat Research Team, you will be be responsible for:

  • Identifying novel tactics, techniques, and procedures (TTPs) being used by attackers to target our customers
  • Identifying new ways that cloud apps are being abused by attackers
  • Performing detailed analysis of the malware and TTPs being used by attackers
  • Writing detailed technical blog posts about the threats and TTPs you discover
  • Working with the data science, engineering, and product teams to feed the insights from your research back into the product
  • Presenting your research at top-tier security conferences

We are looking for threat researchers who can leverage their experience and expertise to identify and analyze threats, produce original research publications, and work with engineering to feedback their insights into the product.

  • Communication
  • A portfolio of technical publications
  • A portfolio of technical presentations at security conferences
  • Communication skills to work in a collaborative team
  • Written and verbal skills to create and deliver high-quality publications and presentations
  • Threat Research
  • Expertise analyzing malware of multiple types, including malicious PDFs, Office Documents, and PE files
  • Experience with common analysis tools, such as IDA Pro, Ghidra, Wireshark, and Fiddler
  • Experience with malware sandboxes, such as Cuckoo
  • Experience with common threat intelligence tools, such as VirusTotal
  • Experience in a malware research role at the professional or academic level
  • Data
  • Experience working with common database and search technologies, such as SQL
  • Software Development
    • Strong software development skills to develop your own tooling as needed
    • Discipline to create well-tested and documented code
  • Education
    • BSCS or equivalent required, MS strongly preferred

Nice To Have
  • Communication
  • Experience interacting with cybersecurity leadership in large organizations
  • Threat Research
  • Experience responding to security incidents and/or triaging alerts and incidents at scale
  • Understanding of anomaly detection and machine learning for detection
  • Understanding of security visualization
  • Data
  • Experience working with big data frameworks, such as Spark
  • Leadership
  • Product leadership / program management experience - implement your vision across teams and stakeholders.