Apply

Ready to go for it?

AI Apply speeds things up—apply directly if you prefer.

Apply faster with JobTailor

Recommended
Apply

Apply your way

Use the standard apply link, or let JobTailor help you move faster.

  • Apply directly in one click
  • No setup required
  • Best if you’re in a hurry
Start AI Apply
Iru

Security Researcher

Iru

. Perform in-depth analysis of malware and adversarial behavior across Windows and macOS to identify detection opportunities.

Posted 4/20/2026full-timeMiami • Florida • 🇺🇸 United StatesMid-LevelSeniorWebsite

Tech Stack

Tools & technologies
Cyber SecurityMacOS

About the role

Key responsibilities & impact
  • Perform in-depth analysis of malware and adversarial behavior across Windows and macOS to identify detection opportunities.
  • Develop and enhance detection rules and behavioral analytics for both platforms, integrated into our EDR product.
  • Collaborate with engineering teams to incorporate detection logic into our cross-platform security agent.
  • Actively contribute to both our EDR and vulnerability products — spanning threat detection and the full vulnerability lifecycle: discovery, product coordination,CVE publications/submissions, and public disclosure.
  • Research and develop new vulnerability detection methods.
  • Continuously monitor emerging threats and trends across Windows and macOS ecosystems.
  • Contribute to the product roadmap for both EDR and vulnerability products by surfacing research-driven insights and detection capability recommendations.
  • Author blog posts and present findings at industry conferences to contribute to the broader security community.
  • Document and communicate research findings clearly, both internally and externally.

Requirements

What you’ll need
  • 3–5 years of experience in cybersecurity, with hands-on focus on malware analysis and threat research across Windows and/or macOS.
  • Proven experience developing file-based and behavioral detections for endpoints (YARA, Sigma).
  • Solid understanding of the vulnerability research lifecycle: discovery through coordinated disclosure and CVE ecosystem.
  • Experience with malware analysis tools and techniques (Binary Ninja, WinDbg, Sysinternals, or Mac Monitor).
  • Strong understanding of OS internals and endpoint security mechanisms on Windows and/or macOS (Endpoint Security APIs).
  • Demonstrated ability to communicate research externally — blog posts, conference talks, or published work.

Benefits

Comp & perks
  • Competitive salary
  • Hybrid work environment (3 days in office per week)
  • 100% individual and dependent medical + dental + vision coverage
  • 401(K) with a 4% company match
  • 20 days PTO
  • Iru Wellness Week the first week in July
  • Equity for full-time employees
  • In-office lunch stipend provided
  • Up to 16 weeks of paid leave for new parents
  • Paid Family and Medical Leave
  • Modern Health mental health benefits for individuals and dependents
  • Fertility benefits
  • Working Advantage employee discounts
  • Onsite fitness center
  • Free parking
  • Exciting opportunities for career growth

ATS Keywords

✓ Tailor your resume
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
malware analysisthreat researchdetection rulesbehavioral analyticsvulnerability detection methodsfile-based detectionsbehavioral detectionsOS internalsendpoint security mechanismsvulnerability research lifecycle
Soft Skills
communicationcollaborationresearch-driven insightsdocumentationpresentation