Find Your Next Career
SLED Account Executive - New York
Senior Demand Generation Manager
Designated Support Engineer
Manager - Compensation & Benefits, EMEA (hybrid working)
Software Development Engineer
Senior Staff DevOps Engineer
Majors Account Executive
Staff Software Development Engineer ( Fullstack )
Customer Success Manager
Lead Adversarial Security Engineer
SDET
Renewals Account Manager
Director, Analyst Relations
Software Development Engineer (C++, Linux)
Staff Solution Consultant
Director, Analyst Relations
Director, Product Marketing Network Detection and Response (NDR)
Senior Software Development Engineer
Software Development Engineer
Technical Support Engineer
Senior Software Development Engineer
Sr Software Quality Engineer
Software Architect
Director, Network Security Engineering
Senior Software Development Engineer(Go+Python+AWS)
Senior Staff Software Development Engineer( Go + Python + AWS)
Staff Software Development Engineer
Full Stack Developer
Senior Product Manager - Endpoint Security
Security Researcher (EU remote)
Staff Research Scientist - Network Security
Customer Success Manager (German Speaking)
Senior Software Development Engineer
Technical Support Engineer - German Speaking (Hybrid)
Software Quality Engineer
Senior Software Development Engineer
Staff Software Development Engineer
Software Development Engineer (C++, Windows)
Software Development Engineer
Senior Software Engineer (Golang, Linux)
Senior SDET
Senior Machine Learning Engineer
Senior Security Consultant
Staff Software Engineer
Senior Software Development Engineer - Database Security Researcher
View all jobs

Security Researcher (EU remote)

ID: JR0036454

Remote Netherlands

Job Title:

Security Researcher (EU remote)

About Trellix:

Trellix, the trusted CISO ally, is redefining the future of cybersecurity and soulful work. Our comprehensive, GenAI-powered platform helps organizations confronted by today’s most advanced threats gain confidence in the protection and resilience of their operations. Along with an extensive partner ecosystem, we accelerate technology innovation through artificial intelligence, automation, and analytics to empower over 53,000 customers with responsibly architected security solutions.
We also recognize the importance of closing the 4-million-person cybersecurity talent gap. We aim to create a home for anyone seeking a meaningful future in cybersecurity and look for candidates across industries to join us in soulful work. More at https://www.trellix.com/.

Role Overview:

We are seeking an experienced Threat Intelligence Analyst to join our Threat Intelligence team, with a focus on proactive hunting across customer telemetry. In this role, you will leverage endpoint, network, email, and other telemetry sources to identify malicious activity and uncover evolving threats. You will contribute directly to intelligence reporting, detection engineering, and customer defense outcomes by combining technical expertise with all-source intelligence methods.

This is an opportunity to be part of a cutting-edge team that delivers an additional service layer beyond core security products—hunting for evidence of compromise, tracking adversary campaigns, and producing actionable intelligence to stay ahead of nation-state, criminal, and emerging threat actors.

Key Responsibilities

Proactively hunt across diverse telemetry sources (endpoint, network, email, cloud, etc.) to identify indicators of malicious activity.

Conduct all-source intelligence analysis to assess adversary campaigns, tactics, techniques, and procedures (TTPs).

Perform static and dynamic malware analysis, reverse engineering, and attribution support.

Create and maintain YARA rules, hunting queries, and detection logic to identify advanced threats.

Track and assess nation-state, cybercriminal, and other malicious activities, both current and historical.

Produce intelligence content including reports, briefings, and blogs for both internal and external stakeholders.

Collaborate with product, detection, and research teams to strengthen detection coverage and intelligence integration.

Share findings with the broader security community through threat reports, blogs, and conference presentations (where appropriate).

We are seeking an experienced Threat Intelligence Analyst to join our Threat Intelligence team, with a focus on proactive hunting across customer telemetry. In this role, you will leverage endpoint, network, email, and other telemetry sources to identify malicious activity and uncover evolving threats. You will contribute directly to intelligence reporting, detection engineering, and customer defense outcomes by combining technical expertise with all-source intelligence methods.

This is an opportunity to be part of a cutting-edge team that delivers an additional service layer beyond core security products—hunting for evidence of compromise, tracking adversary campaigns, and producing actionable intelligence to stay ahead of nation-state, criminal, and emerging threat actors.

 

Key Responsibilities

  • Proactively hunt across diverse telemetry sources (endpoint, network, email, cloud, etc.) to identify indicators of malicious activity.

  • Conduct all-source intelligence analysis to assess adversary campaigns, tactics, techniques, and procedures (TTPs).

  • Perform static and dynamic malware analysis, reverse engineering, and attribution support.

  • Create and maintain YARA rules, hunting queries, and detection logic to identify advanced threats.

  • Track and assess nation-state, cybercriminal, and other malicious activities, both current and historical.

  • Produce intelligence content including reports, briefings, and blogs for both internal and external stakeholders.

  • Collaborate with product, detection, and research teams to strengthen detection coverage and intelligence integration.

  • Share findings with the broader security community through threat reports, blogs, and conference presentations (where appropriate).

Preferred Qualifications

  • Experience working in a managed detection and response (MDR), SOC, or threat hunting service environment.

  • Familiarity with MITRE ATT&CK and other adversary behavior frameworks.

  • Prior experience publishing technical research, blogs, or conference talks.

  • Programming/scripting skills (e.g., Python, Go, PowerShell) to support automation and analysis.

Company Benefits and Perks:

We believe that the best solutions are developed by teams who embrace each other's unique experiences, skills, and abilities. We work hard to create a dynamic workforce where we encourage everyone to bring their authentic selves to work every day. We offer a variety of social programs, flexible work hours and family-friendly benefits to all of our employees.

  • Retirement Plans

  • Medical, Dental and Vision Coverage

  • Paid Time Off

  • Paid Parental Leave

  • Support for Community Involvement

We're serious about our commitment to a workplace where everyone can thrive and contribute to our industry-leading products and customer support, which is why we prohibit discrimination and harassment based on race, color, religion, gender, national origin, age, disability, veteran status, marital status, pregnancy, gender expression or identity, sexual orientation or any other legally protected status.

Share This Job