Start Date
Immediate
Expiry Date
19 Oct, 25
Salary
171000.0
Posted On
20 Jul, 25
Experience
5 year(s) or above
Remote Job
Yes
Telecommute
Yes
Sponsor Visa
No
Skills
Security, Python, Ansible, Migration Projects, Cape, Malware Analysis, Computer Engineering, Puppet, Clamav, Aws, System Administration, Communication Skills, Ips, Computer Science
Industry
Information Technology/IT
JOB SUMMARY:
As a Senior Software Engineer specializing in malware detonation sandboxes, you will play a pivotal role in Protecting Splunk Attack Analyzer customers from threats. Your responsibilities encompass managing and optimizing a fleet of malware sandbox environments with a strong focus on automation, security, and operational reliability. You will apply your expertise in Python, virtualization, static and dynamic analysis to ensure efficient, scalable and reliable detonation of suspect files and URLs.
Your understanding of behavioral malware analysis on Windows (including OS hooks and event log analysis), static detection engines/languages (e.g., Yara, ClamAV, Sigma), and network IDS/IPS technologies (e.g., Snort, Suricata,Zeek) at a fundamental level will be crucial for success in the rule. You should also become comfortable with automation tools (e.g., Ansible, Puppet) for handling large-scale sandbox infrastructure and have the ability to operate Visual Studio C++ for driver/dll compilation. You will collaborate with multi-functional teams to integrate sandbox insights with broader security tooling, drive the migration of sandbox environments to cloud platforms (AWS, GCP, etc.), and ensure operational continuity and compliance. Continuous innovation and documentation are key to the role, supporting evolving defensive strategies against sophisticated adversaries.
REQUIRED QUALIFICATIONS: