Security Research
India, Bangalore
5d ago

Role Overview :

McAfee's Network Security Platform (NSP) is an intelligent IPS solution that discovers and blocks sophisticated threats in the network.

NSP product has been ranked in the Gartner’s Leaders Quadrant for eleven consecutive years.

Do you have a good understanding of the Windows OS internals, basic software exploitation techniques and various class of memory corruption vulnerabilities (Memory overflows, UAFs and relevant exploitation techniques)?

Are you comfortable with understanding of modern software exploit mitigations techniques (DEP, ASLR, CFG, UAF Mitigations)?

Have good hands-on with disassemblers and debuggers and skills to be able to analyse the exploit infection chain?

Used fuzzing tools? Researched & disclosed CVE’s?

We are looking for a self-motivated vulnerability and threat researcher, to work in the industry leading NSP® product.

This position is an integral part of the McAfee Enterprise business segment which was acquired by Symphony Technology Group (STG) in July 2021.

McAfee Enterprise and its team members remain committed to keeping governments and enterprises safe. This position is dedicated to and part of the McAfee Enterprise business.

Company Overview

McAfee is a leader in personal security for consumers. Focused on protecting people, not just devices, McAfee consumer solutions adapt to users’ needs in an always online world, empowering them to live securely through integrated, intuitive solutions that protects their families and communities with the right security at the right moment.

  • Provide guidance for network-based detection of the latest vulnerabilities.
  • Provide support on customer escalations w.r.t vulnerability detection and work with content team to get signatures released.
  • Research popular open source / closed source software and report potential zero days following responsible vulnerability disclosure process.
  • Research and build POC code for exploit / malware detection techniques.
  • Provide actionable research inputs for enhancing existing detection engines.
  • Present at Security Research conferences
  • Publish detailed technical analysis blogs on vulnerabilities / malware
  • Convert POCs into patent
  • Actively collaborate with other research groups across the company
  • Experience, Knowledge and Skills required for the role

  • BTech / BE / MCA in Computer Science with 8-12 years of relevant work experience
  • Experience in vulnerability research, like fuzzing, patch diffing, shell code / exploitation (memory execution protection bypass) techniques
  • Strong reverse engineering and debugging skill
  • In-depth insight on OS internal and understanding of various security threats
  • Solid networking background, familiar with TCP / IP protocol stack, and experience with network security
  • Ability to communicate and work effectively with teams across products, functions, and locations to deliver tasks / projects on time and meet goals
  • Company Benefits and Perks :

    We work hard to embrace diversity and inclusion and encourage everyone at McAfee to bring their authentic selves to work every day.

    We offer a variety of social programs, flexible work hours and family-friendly benefits to all of our employees.

  • Pension and Retirement Plans
  • Medical, Dental and Vision Coverage
  • Paid Time Off
  • Paid Parental Leave
  • Support for Community Involvement
  • We're serious about our commitment to diversity which is why McAfee prohibits discrimination based on race, color, religion, gender, national origin, age, disability, veteran status, marital status, pregnancy, gender expression or identity, sexual orientation or any other legally protected status.

    Report this job

    Thank you for reporting this job!

    Your feedback will help us improve the quality of our services.

    My Email
    By clicking on "Continue", I give neuvoo consent to process my data and to send me email alerts, as detailed in neuvoo's Privacy Policy . I may withdraw my consent or unsubscribe at any time.
    Application form