About

A Global Cyber Threat Intelligence and Adversary Tracking Team
Cluster25 is the internal cybersecurity research division of a worldwide technological company. 

Experienced members from around the World 
The Cluster25 experts are specialized in hunting and collecting cyber threats, analysis and reverse-engineering processes. Cluster25’s members internally develop technologies and tools for attribution practices, classification and categorization of malicious artifacts often before these are used in operations.

TTPs and Threat Insights
Cluster25 shares its findings and insights about the tools, techniques and procedures threat actors use to break in enterprises, organizations and government institutions around the world. 

Work with Cluster25

If you can…

  • Deeply reverse engineering malware and produce detailed reports.
  • Analyze and propose mitigations for 0day vulnerabilities and emerging threats.
  • Create detection content (Snort, Yara, Sigma, ClamAV).
  • Discover vulnerabilities and write exploits.
  • Demonstrate scripting experience in several languages.
  • Source, analyze, prioritize, contextualize and validate cyber threat intelligence data from different sources (OSINT, CLOSINT, commercial third-parties, partners, info-sharing programs etc.etc.) and produce detailed reports.
  • Hunt for malware and other bad things in various datasets through techniques and methodologies aimed at classifying and attributing cyber threats.
  • Be confident with topics such as statistics, probability and AI/machine learning.

Feel free to contact us.

Cluster25 is open to talents with any background and from any region of the world.


> Come achieve big things with us.