Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
- Define the business requirements for a mobile security program.
- Define the tasks and milestones for developing the Mobile Device Diagnostic Analysis Framework and its companion iOS Diagnostic Collection App.
- Define the architecture of the Mobile Device Diagnostic Analysis Framework and its companion iOS Diagnostic Collection App.
- Define the architecture for large-scale collection and processing of mobile device diagnostic data across multiple institutions.
- Define the analysis workflow for mobile devices and the internal curriculum on mobile device analysis.
- Prepare cyber-awareness demonstrations, especially in the area of mobile hygiene.
- Prepare workshops and training sessions on mobile device analysis.
- Develop and maintain open-source tools, including threat intelligence platforms, the Mobile Device Diagnostic Analysis Framework, the mobile application for collecting diagnostic data on Apple devices, and supporting infrastructure for large-scale collection and processing of diagnostic files.
- Coordinate and review mobile device analysis reports, pull requests on open-source projects, and tickets raised on open-source projects.
- Assist with project management and with defining the architecture of threat intelligence platforms.
- Build and maintain a database of detection rules for mobile devices.
Profil recherché :
What do you need to succeed in this position?
- Master's degree in IT and minimum 6 years in similar position and in ICT.
- Very good knowledge of incident response and threat detection KPIs and metrics, sysdiagnose analysis using open-source tools, operating system architecture and behaviors, Linux system administration, and advanced mobile security threats.
- Very good knowledge of networking, Splunk, and threat intelligence platforms (e.g., MISP).
- Strong experience in Swift, Python, and PHP programming, including the CakePHP framework, as well as creating, supporting, and developing open-source projects mainly in Python and Swift.
- Strong experience in incident response, digital forensics (including mobile forensics), malware analysis, intrusion analysis, and reverse engineering concepts.
- Strong experience in project management, leading small groups, sharing knowledge with peers, and presenting at technical conferences.
- At least one certification in architecture and at least one certification in Cybersecurity, or Information security are mandatory in areas such as strategic planning/policy/leadership (e.g., GSTRT), advanced threat defence (e.g., GDAT), network forensics (e.g., GNFA), digital forensics (e.g., GCFA/GCFE), malware reverse engineering (e.g., GREM), and intrusion analysis (e.g., GCIA).
- Excellent English language skills(C-level, written and spoken).
Key Skills
Ranked by relevanceReady to apply?
Join EKXEL IT Services & Financial Engineering and take your career to the next level!
Application takes less than 5 minutes

