The Latest in IT Security

Security Researcher


Security Researcher

Posted: 1 February 2013
Company name: Alert Logic
Location: Houston, TX 77056
United States
Poster represents: employer

Alert Logic is hiring for a Security Researcher to work with our team of Research Engineers in analyzing new threats, proactively finding vulnerabilities and writing detection logic for these attacks. The successful candidate will have experience in writing signatures, reverse engineering, exploit development and/or offensive/defensive security tactics.

Alert Logic sits at the nexus of two of the hottest trends in IT: the adoption of cloud technologies and increased security and compliance requirements driven by an increasingly connected world. In a typical month, Alert Logic processes over 100 million security events and stores petabytes of data for over 1,300 enterprise customers. We are an established company with a history of almost ten years, yet maintain a pace, energy and agility that allows us to advance our offerings and technology and preserve a startup-like culture.


Employ strong knowledge of security concepts and practices to proactively identify threats, vulnerabilities and exploits

Analyze and respond to emerging threats and rapidly develop protection for our clients

Investigate and analyze new threats, vulnerabilities and exploits and document and develop countermeasures

Serve as an escalation point for the Security Operations Center for new incidents

Make recommendations for appropriate development, engineering and corporate processes and procedures

Answer questions from clients regarding new attacks and trends

Perform reverse engineering of malicious code

Required skills:
Strong passion for the security field

Strong understanding of TCP/IP, Microsoft Windows, Unix & Linux operating systems

Experience with high-level scripting languages (such as Python, Perl or Ruby) and Shell scripting

Familiarity working with network switches, routers, firewalls and network monitoring tools

Understanding of concepts such as various memory corruption attacks, web exploitation techniques, popular packing algorithms such as UPX, and behavioral analysis of mal-ware

Real world hands-on security experience such as security assessments, penetration testing and ethical hacking are desirable.

Computer Security Certifications such as OSCP, NOP, GREM, GWAPT or GPEN are a plus

URL for more information:

Contact information:
Please click the link below to apply:

Leave a reply



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments