As a security researcher, you will be responsible for applying your cyber related knowledge to identify applicable content for subscription based users. Utilize research techniques in data mining to identify relevant information, stories, artifacts and other illicit activities pertaining to cyber threats, and other cyber related topics on a global scale. These individuals will be proficient in reverse engineering particular cyber threats to ascertain their origin, tactics and overall impact as a threat. This position requires proficiency and tradecraft in communications, intelligence collection methodologies, attribution and association from various sources.