Job Details :
Role : Security Researcher
Experience : 3 to 7+ years (depending on level)
Location : Flexible (Onsite / Hybrid / Remote as per business need)
Employment Type : Full-time
We are looking for a highly skilled and motivated Security Researcher to join our cybersecurity team.
The ideal candidate will have strong expertise in vulnerability research, exploit development, malware analysis, and threat intelligence.
This role involves identifying security weaknesses, analyzing advanced threats, and contributing to the design of more secure systems and applications.
The Security Researcher will work closely with security engineers, developers, and incident response teams to ensure robust protection against emerging cyber risks.
Key Responsibilities :
Vulnerability Research & Exploit Development :
- Identify and analyze vulnerabilities in operating systems, applications, and network protocols.
- Develop proof-of-concept (PoC) exploits to validate vulnerabilities.
- Research novel attack vectors and advanced exploitation techniques.
Threat Intelligence & Malware Analysis :
Analyze malware samples, reverse-engineer binaries, and understand attacker tactics.Monitor and assess evolving cyber threats, APT campaigns, and zero-day exploits.Provide actionable intelligence to improve defensive Tooling & Automation :Develop scripts and tools to automate vulnerability discovery and analysis.Contribute to open-source security projects and internal research tools.Perform fuzzing, static, and dynamic analysis of & Reporting :Work with developers and product security teams to recommend mitigations.Collaborate with incident response and SOC teams for advanced threat detection.Document and present findings in detailed technical reports and research papers.Required Skills & Qualifications :
Bachelors / Masters degree in Computer Science, Cybersecurity, or equivalent practical experience.3 to 7+ years of experience in vulnerability research, exploit development, or malware analysis.Strong knowledge of operating system internals (Windows, Linux, Android, iOS).Hands-on experience with reverse engineering tools (IDA Pro, Ghidra, Radare2, OllyDbg).Expertise in low-level programming (C, C++, Assembly) and scripting (Python, PowerShell, Bash).Knowledge of network protocols, cryptography, and secure coding practices.Familiarity with penetration testing frameworks (Metasploit, Burp Suite).Strong debugging, fuzzing, and exploit development skills.Preferred Skills :
Experience with cloud security research (AWS, Azure, GCP).Contributions to CVE research, security advisories, or open-source projects.Knowledge of machine learning in threat detection.Publications in security conferences, blogs, or industry journals.What We Offer
Opportunity to work on cutting-edge security challenges and zero-day research.Collaborative environment with top industry security professionals.Competitive compensation and benefits.Training, certifications, and conference sponsorships (Black Hat, DEF CON, etc.(ref : hirist.tech)