Cyber Security Analyst/Malware Analyst

Perimeterwatch New York , NY 11106

Posted 1 week ago

Job Description

Job Title:

Cyber Security Analyst/Malware Engineer



Job Description:

Perimeterwatchs Security Team is currently seeking multiple skilled Security/Malware Analysts capable of analyzing threads and Reverse Engineering malware. Analysts will perform advanced analysis of malicious code and their capabilities. You will provide cyber threat and intelligence analysis, and develop related reports. You will also develop and maintain subject matter expertise of Advanced Persistent Threats and assist with Incident Response efforts. In addition you will be involved in designing advanced analytics and countermeasures to protect critical assets from threats. Analysts will be responsible for incident handling, response combat tactics and operations necessary to deter attacks.

Basic

Requirements:

  • In-depth understanding of low level programming in C, C++/Assembly (x86.)

  • In-depth understanding of the Python language

  • Solid experience performing static analysis of malware using IDA Pro/Ollydbg and other disassembler/debugging tools to determine functionality.

  • Experience with Windows system programming, driver development and/or IDA Python

  • Deep understanding of the Linux OS

  • Mobile IOS/Android experience

  • Experience with DShell

  • Experience developing software applications

  • An understanding of information security, network architecture, database concepts, document management, hardware and software troubleshooting, Microsoft Office applications, and virtualization solutions



    Required Qualifications:

  • BA/BS degree in Information Technology or Information Security, Computer Science, Intelligence Studies, Cyber Security or another related field of study or equivalent 3+ years performing technical cyber threat intelligence analysis.

  • Ability to reverse engineer binaries of various types including: x86, x64, C, C++, .NET, and Delphi

  • Understanding of x86, ARM, and x64 architectures

  • Capable of Python scripting to automate analysis and reverse engineering tasks

  • Strong knowledge of tools used for malware analysis such as debuggers and disassemblers

  • Strong understanding of Windows Operating System Internals and Windows APIs

  • Ability to analyze shellcode; packed and obfuscated code and the associated algorithms

  • Understanding of common attacker methodologies and exploit techniques

  • Understanding of network protocols and networking concepts

  • Strong initiative, problem solving and critical thinking skills

  • Experience on a Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT), Computer Security Incident Response Center (CSIRC) or a Security Operations Center (SOC).

    Experience

  • Experience analyzing streams from SIEM/SIM/SEM tools including Qradar/AlienVault et.al

  • RSA Security Analytics / Net Witness

  • Splunk, including Splunk for Enterprise Security

  • RSA Archer

  • SourceFire/FirePower/Snort

  • McAfee ePO, HIPS

  • FireEye NX, EX, HX et.al

Company Description

Cyber Security Experts
Find your dream job anywhere
with the LiveCareer app.
Download the
LiveCareer app and find
your dream job anywhere
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Security Analyst Cyber Incident Response Team

Bloomberg

  Posted 2 days ago

VIEW JOBS 5/25/2018 12:00:00 AM 2018-08-23T00:00 We Protect Bloomberg. The Bloomberg Cyber Incident Response Team (CIRT) is responsible for the detection of cyber threats and cyber incident response across Bloomberg's diverse lines of business and vast global network. What's The Role? The Bloomberg CIRT is seeking a new member of its team to expand our security operations, incident response, and threat intelligence capabilities. This function is considered to be a key pillar in our security design. We are looking for a motivated information security professional who has both demonstrated experience and a passion for these disciplines. Ideally, you will have proven abilities and experience in one of these areas. We can provide the opportunity for you to apply current skills and develop new ones. The CIRT is an open and collaborative environment where members work together to identify and address the latest in cyber security threats and attacks facing the company. As a member of the CIRT, you will be working with the latest cyber detection and defense technologies to address the dynamic and ever-changing world of cyber-attack detection and defense. We'll Trust You To: * Serve as a contact point for suspicious and malicious events escalated by CSOC. * Review and analyze technical components of malware and attacks while developing and refining detection criteria. * Review security events and data sources to develop and refine detection criteria. * Review and analyze raw network captures and network flow data to identify malicious and suspicious behaviors/signatures. * Perform deep host and network level analysis in support of Incident Response. * Create methods and tools to detect suspicious and malicious events occurring on our networks and systems. * Produce/maintain documentation and standard operational procedures. You'll Need To Have: * Understanding of privilege escalation, persistence, and lateral movement techniques. * Knowledge of common malware and exploit tools/techniques. * Understanding of host and network Incident Response processes, tasks, and tools. * Grasp of enterprise network security controls and defenses. * Experience with malware and attacker techniques leveraged in enterprise environments. * Static and dynamic analysis systems techniques and technologies. * Strong scripting and automation skills. * Experience with Windows, Linux, and Mac operating systems. If That Sounds Like You: Apply - if we believe you're a good match, we'll get in touch to let you know next steps. Bloomberg is an equal opportunity employer, and we value diversity at our company. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status. Apply Now Security Analyst – Cyber Incident Response TeamNew York Posted Oct 27, 2017 - Requisition No. 62992 Apply Now We Protect Bloomberg. The Bloomberg Cyber Incident Response Team (CIRT) is responsible for the detection of cyber threats and cyber incident response across Bloomberg's diverse lines of business and vast global network. What's The Role? The Bloomberg CIRT is seeking a new member of its team to expand our security operations, incident response, and threat intelligence capabilities. This function is considered to be a key pillar in our security design. We are looking for a motivated information security professional who has both demonstrated experience and a passion for these disciplines. Ideally, you will have proven abilities and experience in one of these areas. We can provide the opportunity for you to apply current skills and develop new ones. The CIRT is an open and collaborative environment where members work together to identify and address the latest in cyber security threats and attacks facing the company. As a member of the CIRT, you will be working with the latest cyber detection and defense technologies to address the dynamic and ever-changing world of cyber-attack detection and defense. We'll Trust You To: * Serve as a contact point for suspicious and malicious events escalated by CSOC. * Review and analyze technical components of malware and attacks while developing and refining detection criteria. * Review security events and data sources to develop and refine detection criteria. * Review and analyze raw network captures and network flow data to identify malicious and suspicious behaviors/signatures. * Perform deep host and network level analysis in support of Incident Response. * Create methods and tools to detect suspicious and malicious events occurring on our networks and systems. * Produce/maintain documentation and standard operational procedures. You'll Need To Have: * Understanding of privilege escalation, persistence, and lateral movement techniques. * Knowledge of common malware and exploit tools/techniques. * Understanding of host and network Incident Response processes, tasks, and tools. * Grasp of enterprise network security controls and defenses. * Experience with malware and attacker techniques leveraged in enterprise environments. * Static and dynamic analysis systems techniques and technologies. * Strong scripting and automation skills. * Experience with Windows, Linux, and Mac operating systems. If That Sounds Like You: Apply - if we believe you're a good match, we'll get in touch to let you know next steps. Bloomberg is an equal opportunity employer, and we value diversity at our company. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status. Bloomberg New York NY

Cyber Security Analyst/Malware Analyst

Perimeterwatch