Staff Threat Intelligence Researcher

Lookout Inc
Remote France Full-time 🌐 English
LI
Added to JobCollate: March 12, 2026

AI Summary Powered by Gemini

Lookout Inc. is seeking a Staff Threat Intelligence Researcher to identify, analyze, and track advanced threat actors targeting mobile devices. This remote role requires expertise in mobile malware analysis, adversary infrastructure investigation, and independent research using extensive detection tools and data sources.

Job Description

Lookout, Inc. is the endpoint to cloud security company purpose-built for the intersection of enterprise and personal data. We safeguard data across devices, apps, networks and clouds through our unified, cloud-native security platform — a solution that's as fluid and flexible as the modern digital world. By giving organizations and individuals greater control over their data, we enable them to unleash its value and thrive. Lookout is trusted by enterprises of all sizes, government agencies and millions of consumers to protect sensitive data, enabling them to live, work and connect — freely and safely. To learn more about the Lookout Cloud Security Platform, visit www.lookout.com and follow Lookout on our blog, LinkedIn and Twitter. We are looking for a Staff Security Researcher to join our Threat Intelligence team, a group of top-tier security researchers working to identify, investigate, and track targeted attacks on users of mobile devices. As a member of this team you will use an extensive arsenal of detection tools including the largest collection of mobile apps containing 200M+ Android and iOS apps to find and research mobile malware and hunt down malicious actors, their infrastructure, tooling and techniques. What you’ll do: - Identify, analyze and track advanced nation state and financially motivated threat actors and their tactics, techniques, and procedures (TTPs). - Develop strategies to hunt mobile threats targeting enterprises and individuals. - Reverse-engineer and analyze capabilities of mobile malware. - Investigate adversary command-and-control and phishing infrastructure. - Conduct independent research and report findings to Threat Intelligence customers. - Mine internal and external data sources to identPlease mention the word TWINKLY and tag RODguMTk4Ljk5LjE0Mw== when applying to show you read the job post completely (#RODguMTk4Ljk5LjE0Mw==). This is a beta feature to avoid spam applicants. Companies can search these words to find applicants that read this and see they're human.

Full Description

Lookout, Inc. is the endpoint to cloud security company purpose-built for the intersection of enterprise and personal data. We safeguard data across devices, apps, networks and clouds through our unified, cloud-native security platform — a solution that's as fluid and flexible as the modern digital world. By giving organizations and individuals greater control over their data, we enable them to unleash its value and thrive. Lookout is trusted by enterprises of all sizes, government agencies and millions of consumers to protect sensitive data, enabling them to live, work and connect — freely and safely. To learn more about the Lookout Cloud Security Platform, visit www.lookout.com and follow Lookout on our blog, LinkedIn and Twitter. We are looking for a Staff Security Researcher to join our Threat Intelligence team, a group of top-tier security researchers working to identify, investigate, and track targeted attacks on users of mobile devices. As a member of this team you will use an extensive arsenal of detection tools including the largest collection of mobile apps containing 200M+ Android and iOS apps to find and research mobile malware and hunt down malicious actors, their infrastructure, tooling and techniques. What you’ll do: - Identify, analyze and track advanced nation state and financially motivated threat actors and their tactics, techniques, and procedures (TTPs). - Develop strategies to hunt mobile threats targeting enterprises and individuals. - Reverse-engineer and analyze capabilities of mobile malware. - Investigate adversary command-and-control and phishing infrastructure. - Conduct independent research and report findings to Threat Intelligence customers. - Mine internal and external data sources to identPlease mention the word TWINKLY and tag RODguMTk4Ljk5LjE0Mw== when applying to show you read the job post completely (#RODguMTk4Ljk5LjE0Mw==). This is a beta feature to avoid spam applicants. Companies can search these words to find applicants that read this and see they're human.

Required Skills

ios security cloud mobile android