الوصف الوظيفي
Come work at a place where innovation and teamwork come together to support the most exciting missions in the world!Come work at a place where innovation and teamwork come together to support the most exciting missions in the world!As Security Signature Engineer, you will be part of a motivated engineering team that is responsible for the research, development, and delivery of signatures in the Qualys Security products spanning across multiple domains such as asset identity, vulnerability detections, etc. This opening is your opportunity to work in the rapidly expanding field of computer security with a company that has excellent customer ratings and outstanding growth rates. Responsibilities:Research and create signatures for the Qualys product to recognize assets of different varieties such as Laptops, Desktops, Mobile Phones, Cameras, PLCs, Communication Modules, I/O Modules, RTUs, IoT devices etc. from the fingerprints of their communication protocol messages.Research new and emerging products and innovative use of networking protocols to identify assets from their network behaviour. Apply product research to correlate and identify patterns within data (packet captures) gathered from field devices and code these into identity or security signatures.Build automation for day-to-day tasks that are part of your research job.Closely work with customer support to troubleshoot and triage customer issues such as fingerprinting unidentified devices, fixing incorrect fingerprints, etc. Qualifications:BS or MS in computer science with 2-4 years of experience in Information Security domain or cyber security.Experience with network analysis tools, and analysis of packet captures using Wireshark.In-depth knowledge of TCP/IP, HTTP, FTP, SSH, SSL, NetBios, eMail, DNS, DHCP, Samba/Windows-Networking and understanding of UPnP protocols.Experience with scripting languages, including Python and Bash.Excellent written and verbal communication skills.Flair and patience for research and documentation of gathered information.Additional good to have Competencies:Knowledge of Virtualization software (VMWare, Virtual PC/Virtual Box, XEN, etc.).Knowledge of any of the Industrial protocols such as S7 Comm, Modbus, Ethernet IP, CIP, BACnet, etc. would be a huge advantage.Proficiency with regular expressions.Understanding of Lua (preferred), or Java.Knowledge of any Cloud Platform (AWS, Azure, Oracle, etc.).System administrator experience on Windows or Unix platforms.Ability to handle projects independently.Experience in developing security-related tools/programsKnowledge of security domain