This job post is closed and the position is probably filled. Please do not apply. Work for Carbon Black and want to re-open this job? Use the edit link in the email when you posted the job!
\nWhy Carbon Black?\n\nAt Carbon Black, you’ll have the chance to make an impact in the ever-evolving cybersecurity space. Our advanced technology tackles even the toughest challenges and stays ahead of the latest threats.\n\nIf you want to join an agile company that’s building bleeding edge technology in the cloud, Carbon Black is the place for you. Driven by passionate people who are dedicated to making the world safer, it’s no wonder we’ve been named a “Top Place to Work” by the Boston Globe for four consecutive years. Join us!.\n\nWhy You Matter\n\nCarbon Black, the leader in advanced threat protection, is seeking a Senior Threat Engineer. This is a senior level position targeted toward individuals with more than 10 years of experience in software development. \n\nExperience in software development, debugging, and testing - including in languages such as C++, C, python, assembly, and shell scripting is required. Understanding of modern defensive and offensive security tools, techniques and methods is also required. Educational and personal experience with network/systems administration and/or information security related work is necessary.\n\nSenior Threat Engineers at Carbon Black are responsible for leading, conducting and presenting threat research done by the Threat Analysis Unit (TAU) and building systems used across our security program. This includes the strong understanding of endpoint detection, cloud technologies, security operations, current threatscape and emerging threats. Senior Threat Engineers will participate in the design, development, and deployment of tools to assist in threat research and security frameworks utilized by our products. Senior Threat Engineers are also expected to provide mentorship to other members of the team, and take lead in maturing procedures, evaluating new security technologies, incident response, penetration testing, and prototype/experiment with new ideas and technologies to improve both our product and services.\n\nWhat You’ll Do\n\n\n* Actively work on current software development projects related to product enhancements and efficacy. Create new software tools for internal research and development.\n\n* Design and implement software proof of concepts for emerging malware technique detections.\n\n* Performs security research, reverse engineer malware, handle complex security events, and analyze incident response, and coordinating with other teams.\n\n* Work closely with internal and external customers for product and service improvements.\n\n* Take ownership or support ongoing projects by assisting in the implementation, research, testing and documentation of security related projects.\n\n* Maintain knowledge of emerging security technologies and discipline developments. Research and manage the implementation of new technologies to enhance our products and customers’ security postures.\n\n* Actively participate in the Carbon Black User-Exchange community as a subject matter expert, presenting in forums, online and at conferences.\n\n\n\n\nTechnical Skills / Experience:\n\n\n* Experience with a number of the following is a requirement: C, C++, x86/x64 assembly, Python, Unix Shell scripts, Powershell\n\n\n\n\n\n* Experience in participating in medium and large scale software development projects - from initial conception and design to final deployment.\n\n* Experience with Java or C# is a plus\n\n\n\n\n\n* Windows operating system internals (registry, APIs, kernel operations, forensic artifacts)\n\n* Windows development of user mode applications using Visual Studio. Kernel development experience is a plus. Development on other platforms other than Windows is also a plus.\n\n* Ability to translate descriptions of attacks or malware techniques into proof of concept demonstrations for testing and product improvement.\n\n\n\n\nWhat You’ll Bring\n\n\n* Windows or other operating system internals experience\n\n* Knowledge of x86 and x64 instruction set architectures\n\n* Knowledge of user and kernel level debuggers and static analysis applications such as WinDbg, OllyDbg, x64dbg, Binary Ninja, or IDA Pro\n\n* Ability to analyze malware, determine TTPs (tactics, techniques, and procedures) unique to threat actors, and extract indicators to feed back into the products\n\n* Strong interpersonal skills, ability to mentor/train staff and bring awareness to current and emerging threats\n\n* Certifications preferred: CISSP, OSCP/OSCE, SANS GIAC Certifications (GREM, GCFA, GCFE)\n\n* Strong written and verbal communications skills with an ability to present technical risks and issues to non-technical audiences\n\n\n \n\n#Salary and compensation\n
No salary data published by company so we estimated salary based on similar jobs related to Senior, Java, Cloud and Engineer jobs that are similar:\n\n
$70,000 — $120,000/year\n
\n\n#Benefits\n
๐ฐ 401(k)\n\n๐ Distributed team\n\nโฐ Async\n\n๐ค Vision insurance\n\n๐ฆท Dental insurance\n\n๐ Medical insurance\n\n๐ Unlimited vacation\n\n๐ Paid time off\n\n๐ 4 day workweek\n\n๐ฐ 401k matching\n\n๐ Company retreats\n\n๐ฌ Coworking budget\n\n๐ Learning budget\n\n๐ช Free gym membership\n\n๐ง Mental wellness budget\n\n๐ฅ Home office budget\n\n๐ฅง Pay in crypto\n\n๐ฅธ Pseudonymous\n\n๐ฐ Profit sharing\n\n๐ฐ Equity compensation\n\nโฌ๏ธ No whiteboard interview\n\n๐ No monitoring system\n\n๐ซ No politics at work\n\n๐
We hire old (and young)\n\n