About this role
As a Senior Associate - Cybersecurity, you work as an individual contributor on client matters involving network security and secure systems architectures. You combine technical security testing and reverse engineering with patent analysis and IP monetization research for litigation and monetization lifecycle support.
Key Responsibilities
- Perform cybersecurity technical analysis including reverse engineering and testing
- Conduct patent analysis and IP monetization research for cybersecurity technologies
- Design and execute security test plans and experiments
- Assess vulnerability exposure, exploitability, and threat detection/response behavior
- Review specifications, reference implementations, and technical standards for compliance and adherence
Technical Overview
Conduct reverse engineering and testing of security protocols, secure network stacks, and application-level controls such as TLS, VPNs, and IAM/access control mechanisms. Build and run security test plans to evaluate vulnerability exposure, exploitability, and threat detection/response behavior, with attention to compliance standards such as NIST, ISO 27001, and PCI-DSS.
Ideal Candidate
The ideal candidate is a cybersecurity professional with experience working on individual contributor client engagements that include network security and secure system architectures. They are strong in security testing and reverse engineering (including TLS/VPN/IAM concepts) and can produce patent analysis and IP monetization research such as prior art searching, claim charting, and due diligence aligned to NIST, ISO 27001, and PCI-DSS.
Must-Have Skills
Contribute as an individual contributor on client projects involving cybersecuritynetwork securityand secure systems architecturesDeliver patent analysis and IP monetization research related to cybersecurity technologiesAnalyzereverse engineerand test implementations of security protocolssecure network stacksand application-level security controlsDesign and execute security test plans and experimentsReview specificationsreference implementationsand technical standards
Tools & Platforms
industry-standard toolscustom-built tools
Required Skills
cybersecuritynetwork securitysecure systems architecturespatent analysisIP monetization researchtechnology due diligenceclaim charting/infringement analysisprior art searchingmarket researchtarget scoutingreverse engineeringsecurity protocolssecure network stacksapplication-level security controlsTLSVPNsIAMaccess control mechanismsendpoint security agentssecurity test plans and experimentsvulnerability exposureexploitabilitythreat detection and responseNISTISO 27001PCI-DSSspecifications reviewreference implementationstechnical standards reviewsource code reviews
Hard Skills
cybersecuritynetwork securitysecure systems architecturespatent analysisIP monetization researchtechnology due diligenceclaim charting/infringement analysisprior art searchingmarket researchtarget scoutingreverse engineeringsecurity protocolssecure network stacksapplication-level security controlsTLSVPNsIAMaccess control mechanismsendpoint security agentssecurity test plans and experimentsvulnerability exposure evaluationexploitability evaluationthreat detection and response behavior evaluationstandards/compliance adherenceNISTISO 27001PCI-DSSspecifications reviewtechnical standards reviewsource code reviews
Soft Skills
clear communicationownershippractical problem-solvingcollaborationclient-facing communicationrelationship building
Keywords for Your Resume
Senior Associate - Cybersecuritycybersecuritynetwork securitysecure systems architecturespatent analysisIP monetization researchtechnology due diligenceclaim charting/infringement analysisprior art searchingmarket researchtarget scoutingreverse engineerreverse engineeringsecurity protocolssecure network stacksapplication-level security controlsTLSVPNsIAMaccess control mechanismsendpoint security agentssecurity test plansvulnerability exposureexploitabilitythreat detection and responseNISTISO 27001PCI-DSSstandards/compliance adherencespecificationsreference implementationssource code reviews
Deal Breakers
Must be able to perform reverse engineering and testing of security protocols and secure network stacks, Must be able to execute security test plans and experiments including vulnerability exposure and exploitability evaluation
Get matched to jobs like this
Luna finds roles that fit your skills and career goals — no endless scrolling required.
Create a Free Profile