Freelance Researcher – Ai Augmented Cyber Threat Detection

Year    Remote, IN, India

Job Description

Lead the research, design, and development of an AI-Augmented Unified Security Framework (AI-USF) that integrates Zero Trust Network Architecture (ZTNA), Identity & Access Management (IAM), and AI-driven behavioural intelligence.

Conduct experiments involving privilege escalation, fileless malware detection, and backdoor/C2 behavioural analysis, utilizing memory forensics, command-sequence analytics, and code-level anomaly modelling.

Develop datasets, ML models, and detection engines that fuse network telemetry, identity logs, behavioural patterns, and runtime code activity into a unified detection pipeline.

Validate the architecture and models using simulated enterprise environments, red-team scenarios, and real-world threat samples.

Master's or Ph.D. in Cybersecurity, Computer Science, Information Security, Network Engineering, or a related field.

Research background in Zero Trust, IAM systems, behavioural AI, or malware analysis.

Strong understanding of enterprise security architectures and modern threat landscapes (fileless malware, identity-based attacks, backdoors).

Zero Trust / Network Security:

ZTNA platforms: Istio, Envoy, OpenZiti. Micro-segmentation and policy enforcement concepts

Identity & Access Management:

IAM/PAM tools: Keycloak, Azure AD, Okta and IAM telemetry (login patterns, privilege elevation logs, token usage)

Behavioural & Malware Analysis:

Volatility Framework, PowerShell/WMI tracing, LOLBins analysis and Red-team/malware labs: CALDERA, Atomic Red Team

AI / ML / Code Analysis:

Python, TensorFlow, PyTorch, CodeQL, Semgrep, Graph Neural Networks, LSTM, Autoencoders, AST/CFG-based static analysis

Data Engineering & Processing:

Pandas, NumPy, Log parsing, memory-dump analysis, Dataset generation and preprocessing workflows

2+ years of hands-on experience in cybersecurity research, malware analysis, threat detection, or IAM/ZTNA modelling.

Prior work involving: Privilege escalation analysis, Fileless malware or memory-resident threat detection and Backdoor/C2 behavioural investigation

Experience building or evaluating ML-based intrusion or abnormal-behaviour detection systems.

Familiarity with federated learning, adversarial ML, or graph-based security analytics is highly desirable.

Strong grasp of Zero Trust principles: continuous verification, micro-segmentation, dynamic policies.

Deep understanding of identity, privilege, and access behaviour, including authentication patterns, entitlement graphs, and token misuse.

Knowledge of fileless malware techniques (PowerShell chains, reflective DLL injection, LOLBins).

Ability to perform memory forensics, identify behavioural indicators of compromise, and analyse in-memory execution traces.

Competence in code-level security analysis, including AST-based anomaly detection, logic-bomb identification, and concealed backdoor pattern recognition.

Expertise in security-focused ML: anomaly detection, sequence models, GNNs, representation learning.

Ability to design reproducible, academically rigorous research pipelines.

Lead the research, design, and development of an AI-Augmented Unified Security Framework (AI-USF) that integrates Zero Trust Network Architecture (ZTNA), Identity & Access Management (IAM), and AI-driven behavioural intelligence.

Conduct experiments involving privilege escalation, fileless malware detection, and backdoor/C2 behavioural analysis, utilizing memory forensics, command-sequence analytics, and code-level anomaly modelling.

Develop datasets, ML models, and detection engines that fuse network telemetry, identity logs, behavioural patterns, and runtime code activity into a unified detection pipeline.

Validate the architecture and models using simulated enterprise environments, red-team scenarios, and real-world threat samples.

Master's or Ph.D. in Cybersecurity, Computer Science, Information Security, Network Engineering, or a related field.

Research background in Zero Trust, IAM systems, behavioural AI, or malware analysis.

Strong understanding of enterprise security architectures and modern threat landscapes (fileless malware, identity-based attacks, backdoors).

Zero Trust / Network Security:

ZTNA platforms: Istio, Envoy, OpenZiti. Micro-segmentation and policy enforcement concepts

Identity & Access Management:

IAM/PAM tools: Keycloak, Azure AD, Okta and IAM telemetry (login patterns, privilege elevation logs, token usage)

Behavioural & Malware Analysis:

Volatility Framework, PowerShell/WMI tracing, LOLBins analysis and Red-team/malware labs: CALDERA, Atomic Red Team

AI / ML / Code Analysis:

Python, TensorFlow, PyTorch, CodeQL, Semgrep, Graph Neural Networks, LSTM, Autoencoders, AST/CFG-based static analysis

Data Engineering & Processing:

Pandas, NumPy, Log parsing, memory-dump analysis, Dataset generation and preprocessing workflows

2+ years of hands-on experience in cybersecurity research, malware analysis, threat detection, or IAM/ZTNA modelling.

Prior work involving: Privilege escalation analysis, Fileless malware or memory-resident threat detection and Backdoor/C2 behavioural investigation

Experience building or evaluating ML-based intrusion or abnormal-behaviour detection systems.

Familiarity with federated learning, adversarial ML, or graph-based security analytics is highly desirable.

Strong grasp of Zero Trust principles: continuous verification, micro-segmentation, dynamic policies.

Deep understanding of identity, privilege, and access behaviour, including authentication patterns, entitlement graphs, and token misuse.

Knowledge of fileless malware techniques (PowerShell chains, reflective DLL injection, LOLBins).

Ability to perform memory forensics, identify behavioural indicators of compromise, and analyse in-memory execution traces.

Competence in code-level security analysis, including AST-based anomaly detection, logic-bomb identification, and concealed backdoor pattern recognition.

Expertise in security-focused ML: anomaly detection, sequence models, GNNs, representation learning.

Ability to design reproducible, academically rigorous research pipelines.

Contact Detail :

95661 33822

Job Types: Part-time, Freelance
Contract length: 1 month

Pay: ₹15,000.00 - ₹20,000.00 per month

Benefits:

Flexible schedule Work from home
Work Location: Remote

Beware of fraud agents! do not pay money to get a job

MNCJobsIndia.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.


Job Detail

  • Job Id
    JD4975998
  • Industry
    Not mentioned
  • Total Positions
    1
  • Job Type:
    Part Time
  • Salary:
    Not mentioned
  • Employment Status
    Permanent
  • Job Location
    Remote, IN, India
  • Education
    Not mentioned
  • Experience
    Year