Lookout Logo

Lookout

Senior Staff Threat Intelligence Researcher

Sorry, this job was removed at 02:13 p.m. (GMT) on Friday, Apr 10, 2026
Be an Early Applicant
Easy Apply
Remote
Hiring Remotely in United Kingdom
Easy Apply
Remote
Hiring Remotely in United Kingdom

Similar Jobs

6 Hours Ago
In-Office or Remote
Expert/Leader
Expert/Leader
Blockchain • Fintech • Payments • Financial Services • Cryptocurrency • Web3
As a Lead Security Engineer, you will architect and manage Circle's security data platform, ensuring robust data ingestion, normalization, and response strategies while collaborating on security operations initiatives.
Top Skills: AthenaAWSGlueKafkaMskPythonS3SQL
Senior level
Big Data • Food • Hardware • Machine Learning • Retail • Automation • Manufacturing
Lead change management for S4/o9 transformation in MEU, driving stakeholder engagement and developing change plans to improve business processes.
Top Skills: Change Management MethodologySap S/4 HanaTraining Programs
6 Hours Ago
In-Office or Remote
Senior level
Senior level
Cloud • Information Technology • Internet of Things • Machine Learning • Software • Cybersecurity • Infrastructure as a Service (IaaS)
The ASP Manager oversees vendor relationships, ensures compliance and performance in service delivery, manages escalations, and drives operational improvements within Managed Services and telecom sectors.
Top Skills: Managed ServicesNetwork InfrastructureProcurement

Lookout, Inc. is the endpoint to cloud security company purpose-built for the intersection of enterprise and personal data. We safeguard data across devices, apps, networks and clouds through our unified, cloud-native security platform — a solution that's as fluid and flexible as the modern digital world. By giving organizations and individuals greater control over their data, we enable them to unleash its value and thrive. Lookout is trusted by enterprises of all sizes, government agencies and millions of consumers to protect sensitive data, enabling them to live, work and connect — freely and safely. To learn more about the Lookout Cloud Security Platform, visit www.lookout.com and follow Lookout on our blog, LinkedIn and Twitter.
We are looking for a Sr. Staff Security Researcher to join our Threat Intelligence team, a group of top-tier security researchers working to identify, investigate, and track targeted attacks on users of mobile devices. As a member of this team you will use an extensive arsenal of detection tools including the largest collection of mobile apps containing 200M+ Android and iOS apps to find and research mobile malware and hunt down malicious actors, their infrastructure, tooling and techniques.

What you’ll do:

  • Independently identify, analyze and track advanced nation state and financially motivated threat actors and their tactics, techniques, and procedures (TTPs).
  • Drive development of strategies to hunt mobile threats targeting enterprises and individuals.
  • Reverse-engineer and analyze capabilities of mobile malware.
  • Investigate adversary command-and-control and phishing infrastructure.
  • Conduct independent research and report findings to Threat Intelligence customers.
  • Mine internal and external data sources to identify new campaigns, malware families, and malicious actors.
  • Devise and implement new detection logic and develop innovative and efficient ways to expand and finetune coverage.
  • Prepare and deliver public media reports and present findings at conferences and customer events. 
  • Serve as a key technical leader for customer, prospect, and partner engagement activities.

What we’re looking for:

  • Experience in threat hunting across multiple datasets, security tools such as VirusTotal, Validin, and Shodan and leveraging big data technologies (e.g., Lucene, ElasticSearch, AWS Athena).
  • Experience in reverse engineering software (mobile app reversing preferred).
  • Ability to articulate technical findings both in written reports and presentations. 
  • Experience using some of the following tools: JEB, IDA Pro, Ghidra, Hopper, Frida, Wireshark, DirBuster.
  • Ability to read code in Java and C; ARM Assembly, ObjectiveC and Swift is a bonus.
  • Experience in conducting OSINT investigations.
  • Ability to create research tools in Python.
  • Experience with threat intelligence file types, tools and terminology such as MITRE ATT&CK, STIX, YARA, MISP, OpenCTI and the Intelligence Cycle.
  • Interest in geopolitical dynamics and the ability to apply that context to inform intelligence analysis and threat hunting activities.
  • Curiosity and a strong drive to understand how both state and criminal actors operate.

What you need to know about the Belfast Tech Scene

If asked to name the birthplace of the RMS Titanic, you might not say Belfast. Similarly, if asked to name Europe's leading destination for foreign direct investment in new software development, Belfast might not come to mind. Yet, both are true. The city has emerged as a tech powerhouse, recently ranked among the best in the U.K. for tech careers — especially for software developers. It also leads the U.K. with the highest percentage of software development jobs advertised.

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account