Zscaler Logo

Zscaler

Staff Threat Researcher - Malware Analysis, Reverse Engineering, GenAI/ML

Reposted 12 Hours Ago
Be an Early Applicant
Easy Apply
Hybrid
Pune, Maharashtra
Senior level
Easy Apply
Hybrid
Pune, Maharashtra
Senior level
Perform static and dynamic malware analysis, develop detections and protections, analyze IOCs, validate AI/ML outputs, build automation tools, and publish threat research.
The summary above was generated by AI

About Zscaler

Zscaler accelerates digital transformation to ensure our customers can be more agile, efficient, resilient, and secure. As an AI-forward enterprise, we are constantly pushing the envelope, leveraging the world’s largest security data lake to power our cloud-native Zero Trust Exchange platform. This innovation protects our customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location.

Here, impact in your role matters more than title and trust is built on results. We say, impact over activity. We seek innovators who actively use AI to amplify their impact and who thrive in an environment where we leverage intelligent systems to stay ahead of evolving threats. We believe in transparency and value constructive, honest debate—we’re focused on getting to the best ideas, faster. We build high-performing teams that can make an impact quickly and with high quality. To do this, we are building a culture of execution centered on customer obsession, collaboration, ownership, and accountability.

We value high-impact, high-accountability with a sense of urgency where you’re enabled to do your best work and embrace your potential. If you’re driven by purpose, thrive on solving complex challenges, and want to be part of the team that’s helping to secure the AI age, we invite you to bring your talents to Zscaler and help shape the future of cybersecurity.

Role 

We are looking for a Staff Threat Researcher to join our Threatlabz team. This is a hybrid role based in Mohali,reporting to the Senior Manager, Threat Research. As a key contributor to our threat research initiatives, you will lead the charge in identifying vulnerabilities and analyzing sophisticated malware within the Apple ecosystem. Your expertise in macOS and iOS system internals will drive the development of advanced detection strategies and strengthen our overall product defenses.

What you’ll do (Role Expectations)

  • Perform static and dynamic analysis of macOS and iOS applications, firmware, and system internals to identify vulnerabilities and malicious functionality
  • Reverse-engineer malware samples to decipher behavior, capabilities, and attack vectors while contributing to prevention strategies
  • Research and maintain deep expertise in macOS security features, XNU kernel updates, and frameworks such as Endpoint Security and Network Extensions
  • Develop custom tools and scripts to automate reverse engineering, binary analysis, and malware-related processing tasks
  • Partner with engineering, QA, and threat intelligence teams to integrate new security features and harden product defenses

Who You Are (Success Profile)

  • You thrive in ambiguity. You're comfortable building the path as you walk it. You thrive in a dynamic environment, seeing ambiguity not as a hindrance, but as the raw material to build something meaningful.
  • You act like an owner. Your passion for the mission fuels your bias for action. You operate with integrity because you genuinely care about the outcome. True ownership involves leveraging dynamic range: the ability to navigate seamlessly between high-level strategy and hands-on execution.
  • You are a problem-solver. You love running towards the challenges because you are laser-focused on finding the solution, knowing that solving the hard problems delivers the biggest impact.
  • You are a high-trust collaborator. You are ambitious for the team, not just yourself. You embrace our challenge culture by giving and receiving ongoing feedback—knowing that candor delivered with clarity and respect is the truest form of teamwork and the fastest way to earn trust.
  • You are a learner. You have a true growth mindset and are obsessed with your own development, actively seeking feedback to become a better partner and a stronger teammate. You love what you do and you do it with purpose.

What We’re Looking for (Minimum Qualifications)

  • Proficiency in system-level languages including C, C++, Objective-C, Swift and deep knowledge of macOS architecture, Mach-O binary formats, and security mechanisms like SIP, TCC, and Gatekeeper
  • Extensive hands-on experience with reverse engineering tools such as IDA Pro, Ghidra, Binary Ninja, Frida, and Wireshark
  • Strong scripting skills, particularly in Python, for automating complex analysis and research tasks
  • Proven ability to decompile, disassemble, and de-obfuscate closed-source binaries to reconstruct logic without source code access

What Will Make You Stand Out (Preferred Qualifications)

  • Experience with Windows or Linux platforms for comparative threat analysis
  • Prior professional track record in specialized malware analysis or vulnerability research
  • Thorough understanding of network protocols and system-level communication mechanisms

#LI-Hybrid
#LI-RG

At Zscaler, we are committed to building a team that reflects the communities we serve and the customers we work with. We foster an inclusive environment that values all backgrounds and perspectives, emphasizing collaboration and belonging. Join us in our mission to make doing business seamless and secure.

Our Benefits program is one of the most important ways we support our employees. Zscaler proudly offers comprehensive and inclusive benefits to meet the diverse needs of our employees and their families throughout their life stages, including:

  • Various health plans
  • Time off plans for vacation and sick time
  • Parental leave options
  • Retirement options
  • Education reimbursement
  • In-office perks, and more!

Learn more about Zscaler’s Future of Work strategy, hybrid working model, and benefits here.

By applying for this role, you adhere to applicable laws, regulations, and Zscaler policies, including those related to security and privacy standards and guidelines.

Zscaler is committed to providing equal employment opportunities to all individuals. We strive to create a workplace where employees are treated with respect and have the chance to succeed. All qualified applicants will be considered for employment without regard to race, color, religion, sex (including pregnancy or related medical conditions), age, national origin, sexual orientation, gender identity or expression, genetic information, disability status, protected veteran status, or any other characteristic protected by federal, state, or local laws. See more information by clicking on the Know Your Rights: Workplace Discrimination is Illegal link.

Pay Transparency

Zscaler complies with all applicable federal, state, and local pay transparency rules.

Zscaler is committed to providing reasonable support (called accommodations or adjustments) in our recruiting processes for candidates who are differently abled, have long term conditions, mental health conditions or sincerely held religious beliefs, or who are neurodivergent or require pregnancy-related support.

Top Skills

Genai
Ida
Ids/Ips
Machine Learning
Ollydbg
Perl
Python
Ruby
Tcp/Ip
Windows Internals
X64Dbg
X86 Assembly
Yara

Similar Jobs at Zscaler

2 Days Ago
Easy Apply
Remote or Hybrid
India
Easy Apply
Senior level
Senior level
Cloud • Information Technology • Security • Software • Cybersecurity
The role involves onboarding cybersecurity data sources, mapping and normalizing data, customizing workflows, and collaborating with teams to enhance security measures.
Top Skills: APIsCi/CdCloudCnappContainersCspmCybersecurity ToolsEdrPythonSIEMSQLVm Scanners
2 Days Ago
Easy Apply
Remote or Hybrid
India
Easy Apply
Expert/Leader
Expert/Leader
Cloud • Information Technology • Security • Software • Cybersecurity
Responsible for connecting cybersecurity data sources, mapping security data, and customizing workflows to improve exposure and threat management. Collaborates with sales and engineering for product improvements.
Top Skills: APIsCi/CdContainersCybersecurity ToolsPythonSQL
2 Days Ago
Easy Apply
Hybrid
Easy Apply
Junior
Junior
Cloud • Information Technology • Security • Software • Cybersecurity
As an Associate Data Engineer, you will build and manage data pipelines, collaborate with teams, and develop solutions to enhance data capabilities.
Top Skills: AirflowApache FlinkSparkAutogenDagsterDaskHadoopKorn ShellLangchainPrefectPythonRayScalaSQLStreamlit

What you need to know about the Kolkata Tech Scene

When considering the industries shaping India's tech scene, gaming might not immediately come to mind. However, in the last decade, increased internet usage and greater access to mobile devices have catapulted the industry to new heights, with Kolkata-based companies like Virtualinfocom, Red Apple Technologies and Digitoonz, at the forefront, driving the design and animation of new gaming titles for players.

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account