Analysis of threats according to the Client's business sector;
Indicators of Compromise (IOC) production;
Malware Reverse Engineering;
Publishing analyzes and reports on the main threats.
Responsible for managing vulnerabilities found;
Support in mitigating vulnerabilities;
Preparation of Proof of Control (POC);
Expertise in zero day resolution/discovery.
Responsible for conducting digital investigations;
Collection of Indicators of Compromise (IOCs), time line and Tactics Techniques and Procedures (TTPs)
Want to apply?
Faça upload do seu CV* (max. 4MB)
Upload your photo or video (max. 4MB)