Job Title : Threat Researcher
Location : Hyderabad / Remote
Experience Required : 5+ years of relevant experience
Shift : Morning or Afternoon Shift
About the Role :
We are looking for an experienced Threat Researcher to join our cyber security team. The ideal candidate will have strong experience in Cyber Threat Research, Detection Engineering, and EDR rule writing. You will be responsible for identifying emerging threats, analysing malicious activity, writing high-quality detection rules, and contributing to proactive threat-hunting :
Threat Research & Detection :
- Research emerging cyber threats, malware families, crime ware tools, and extortion groups.
- Analyze threat actor techniques, behaviors, and campaigns using MITRE ATT&CK framework.
- Develop high-quality EDR detection rules based on observed threat behaviors.
- Create threat profiles and provide intelligence-driven recommendations.
Malware & Traffic Analysis :
Perform basic to intermediate malware analysis in sandbox or VM environments.Analyze network traffic (PCAPs) to identify malicious patterns, C2 activity, or indicators of compromise (IOCs).Write YARA rules for malware identification (good to have).Threat Hunting :
Conduct proactive threat hunts across endpoints based on TTPs and intelligence.Identify gaps in current detection logic and recommend improvements.Content & Documentation :
Write clear and technical blogs, threat advisories, and analysis reports.Document detection logic, hypotheses, and threat-hunting methodologies.Cross-Team Collaboration :
Work closely with security engineers, SOC teams, and incident responders.Share intelligence insights and support detection tuning.Act as a proactive team player contributing to overall security posture.Required Skills & Experience :
Must Have :
5+ years of Threat Research / Detection Engineering experience,OR experience writing 50+ EDR detection rules (mandatory knowledge of :Endpoint Detection & Response (EDR) rule writingThreat hunting methodologiesCrime ware, ransom ware, and extortion threatsMITRE ATT&CK frameworkMalware behavior analysis (static / dynamic)Network traffic analysis (PCAP, Wire shark)(ref : hirist.tech)