Integrated within dynamic and passionate teams, you will have the opportunity to fully invest yourself, innovate and create from the latest technologies. You will quickly find your place at Excellium. In order to understand our business, the challenges of our customers and to accompany them we regularly organize meetings, workshops, and training. We will thus help you to develop your skills and position you on stimulating projects, adapted to your profile and enabling you to surpass yourself.
Your team :
As part of a multidisciplinary team, you will work in Excellium’s C SIRT department. The purpose of the service is to help organizations contain, neutralize and remove intrusions by facilitating detection, manipulation and mitigating actual intrusions. The team is also called upon for post-mortem investigations, where the challenge is to support or refute hypotheses formulated following a proven incident. Excellium Services’ CSIRT is young, ambitious and in development.
Your mission :
You will work closely with our CSIRT incidents handlers in order to help them in malware classification and IOC/Key features identification.
Your task will be also to build and maintain a system for collecting samples and extracting IOCs and integrating it in our threat intelligence platform.
Analyse and documents exploits and vulnerabilities targeting our customers.
Share your knowledge during conferences and meeting.
• First experience in a similar job
• Fluent in X86/64 assembly, Python, C, C++, .NET
• Good knowledge of current threats and malwares
• Knowledge of IDA, WinDBG/x96Dbg, DNSpy
• Automation of threat configuration extraction.
• Ability to talk in public and share knowledge.
• CTF Player attitude.
• English B2 or >
• CISC or RISC reversing is an interesting skill.
• Any related certification (GREM, GCIH, GCIA)