Security Engineer Investigator, Account Threats
London, UK
We are seeking an experienced security engineer to proactively detect and analyze root causes of account security abuses, reverse engineer novel malware or other malicious software, investigate complex threats to our business and our users, advance investigative methods, conduct data-driven decision making, and use innovative approaches to protect people from harm. The candidate must have a strong cybersecurity or cyber threat intelligence background and know how to apply it to proactively hunt for threats, be able to use code to automate investigative actions, and be proficient in scripting languages, such as PHP or Python.
The ideal candidate will be an innovative self-starter, who is motivated by our mission, is results-driven, a strategic thinker, and will be able to extract, assimilate, and correlate a wide variety of data in order to surface and disrupt account security abuses.Security Engineer Investigator, Account Threats Responsibilities
- Proactively hunt for threats and undetected abuse by leveraging internal data, open source intelligence, and third-party private intelligence.
- Investigate complex account security abuses to understand in granular detail how abuse is occurring. Identify and implement appropriate detection or prevention strategies to mitigate harm both in the current case and from similar forward-looking abuse.
- Understand the application of tactics, techniques, and procedures, as well as tooling, that actors use across various attack surfaces.
- Reverse engineer malware and other potentially malicious software interacting with Meta platforms or users to derive behaviors indicative of abusive interactions with our platforms.
- Write signatures (e.g. file, network) to detect, hunt, and prevent malware compromise.
- Lead technical investigations from start-to-finish, to include effectively communicating actionable results, analytic judgments, and mitigations to different audience types across cross-functional settings.
- Self-directed identification of trends in adversary behavior, and proactive surfacing of risks that may represent previously unidentified or novel vectors for harm. Deeply understand how abuse manifests and clearly explain emerging threats and trends, with an emphasis on security understanding.
- Analyze and interpret complex, high volume, and high dimensionality data from varying sources to advance investigations, quantify trends, or support findings.
- Take a leadership role in suggesting, prototyping, and teaching novel investigative techniques.
- Partner with other cross-functional teams to identify, influence, and implement holistic solutions to surfacing and responding to emerging threats.
- Manage multiple projects at once while effectively prioritizing time, based on team priorities.
- Automate the everyday tasks and actions conducted during investigations and team processes.
- 5+ years work experience in a cyber security, security investigations, or cyber threat intelligence investigations role.
- Adept at writing queries to analyze and interpret large datasets to advance investigations, quantify trends or support findings.
- Experience investigating and acting on high-impact threats such as account compromise, account creation abuse, business compromise, or malware analysis.
- Proficiency in reverse engineering and familiarity with Android or Windows reverse engineering tools (e.g. JEB, IDAPro, or Ghidra), to include familiarity with machine code in at least one of the preferred architectures (x86/64, ARM/AArch64).
- Proficiency in static and dynamic analysis of malicious software to understand behaviors and intent of the malicious software. Experience should include leveraging results to create malware detection rules (e.g. Yara) and hunting for malware.
- Proficiency working with Python, PHP, or similar scripting languages.
- Experience thinking critically and qualifying assessments with solid communications skills in a cross-functional setting to influence decision makers across all levels of technical background.
- Experience identifying effective strategies to prevent or disrupt abuse at scale. Consult on the design of countermeasures to affect those strategies.
- Experience working with a team spanning multiple locations/time zones.
- Proficiency in detecting and mitigating account abuse for a Web-based service, to include experience with authentication attacks, account generation abuse, bot detection, evasion detection, and/or browser fingerprint analysis.
- 3+ years of red or purple teaming exposure.
- Deep technical and data analysis ability to analyze custom protocols to understand and expose adversarial behaviors.
- Experience with sizing abuses / threats to a Web-based service.
- Experience understanding tactics, techniques, and procedures (TTPs) and actor intent, including extracting this from malware.
- Experience in scoping, communicating, and leveraging cyber threat intelligence to proactively detect, measure, or prevent abuse.
- Experiencing tracking highest priority malware campaigns.
- Expertise with multiple malware file formats.
- Experience using SQL for data analytics and processing large data sets.
- Demonstrated passion for understanding the intersection of global security risks, and how they apply to social media.
- Experience with open source investigation techniques and familiarity with a variety of internet research tools.
- BS/MS or equivalent experience in Computer Science, Information Systems, Intelligence Studies, Cybersecurity or related field.
- Experience working across or contributing to the broader security community (public research, blogging, presentations, open source contributions, etc.)
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Analytics Android Computer Science Data Analytics Ghidra Malware Open Source PHP Physics Prototyping Python Reverse engineering Scripting SQL Teaching Threat intelligence TTPs Windows
Perks/benefits: Career development Flex vacation
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Senior Product Security Engineer jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Cyber Security Architect jobs
- Open Cyber Security Specialist jobs
- Open Product Security Engineer jobs
- Open Cybersecurity Analyst jobs
- Open Security Specialist jobs
- Open Chief Information Security Officer jobs
- Open Staff Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Senior Information Security Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Consultant SOC / CERT H/F jobs
- Open IT Security Analyst jobs
- Open Senior Information Security Engineer jobs
- Open Cybersecurity Consultant jobs
- Open IT Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Cybersecurity Specialist jobs
- Open Security Operations Analyst jobs
- Open Sr. Security Engineer jobs
- Open Security Consultant jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open Pentesting-related jobs
- Open Agile-related jobs
- Open Application security-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open ISO 27001-related jobs
- Open Threat intelligence-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Security assessment-related jobs
- Open Malware-related jobs
- Open Java-related jobs
- Open APIs-related jobs
- Open Security Clearance-related jobs
- Open Forensics-related jobs
- Open SaaS-related jobs
- Open CEH-related jobs
- Open EDR-related jobs
- Open DevOps-related jobs
- Open IDS-related jobs
- Open DoD-related jobs