Cyber Security Analyst/Malware Analyst

Perimeterwatch New York , NY 11106

Posted 3 months ago

Job Description

Job Title:

Cyber Security Analyst/Malware Engineer



Job Description:

Perimeterwatchs Security Team is currently seeking multiple skilled Security/Malware Analysts capable of analyzing threads and Reverse Engineering malware. Analysts will perform advanced analysis of malicious code and their capabilities. You will provide cyber threat and intelligence analysis, and develop related reports. You will also develop and maintain subject matter expertise of Advanced Persistent Threats and assist with Incident Response efforts. In addition you will be involved in designing advanced analytics and countermeasures to protect critical assets from threats. Analysts will be responsible for incident handling, response combat tactics and operations necessary to deter attacks.

Basic

Requirements:

  • In-depth understanding of low level programming in C, C++/Assembly (x86.)

  • In-depth understanding of the Python language

  • Solid experience performing static analysis of malware using IDA Pro/Ollydbg and other disassembler/debugging tools to determine functionality.

  • Experience with Windows system programming, driver development and/or IDA Python

  • Deep understanding of the Linux OS

  • Mobile IOS/Android experience

  • Experience with DShell

  • Experience developing software applications

  • An understanding of information security, network architecture, database concepts, document management, hardware and software troubleshooting, Microsoft Office applications, and virtualization solutions



    Required Qualifications:

  • BA/BS degree in Information Technology or Information Security, Computer Science, Intelligence Studies, Cyber Security or another related field of study or equivalent 3+ years performing technical cyber threat intelligence analysis.

  • Ability to reverse engineer binaries of various types including: x86, x64, C, C++, .NET, and Delphi

  • Understanding of x86, ARM, and x64 architectures

  • Capable of Python scripting to automate analysis and reverse engineering tasks

  • Strong knowledge of tools used for malware analysis such as debuggers and disassemblers

  • Strong understanding of Windows Operating System Internals and Windows APIs

  • Ability to analyze shellcode; packed and obfuscated code and the associated algorithms

  • Understanding of common attacker methodologies and exploit techniques

  • Understanding of network protocols and networking concepts

  • Strong initiative, problem solving and critical thinking skills

  • Experience on a Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT), Computer Security Incident Response Center (CSIRC) or a Security Operations Center (SOC).

    Experience

  • Experience analyzing streams from SIEM/SIM/SEM tools including Qradar/AlienVault et.al

  • RSA Security Analytics / Net Witness

  • Splunk, including Splunk for Enterprise Security

  • RSA Archer

  • SourceFire/FirePower/Snort

  • McAfee ePO, HIPS

  • FireEye NX, EX, HX et.al

Company Description

Cyber Security Experts
Find your dream job anywhere
with the LiveCareer app.
Download the
LiveCareer app and find
your dream job anywhere
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Senior Security Analyst Cyb...

Bloomberg

Posted Today

VIEW JOBS 7/18/2018 12:00:00 AM 2018-10-16T00:00 Our Team:We Protect Bloomberg. The Bloomberg Cyber Incident Response Team (CIRT) is responsible for the detection of threats and incident response across Bloomberg's diverse lines of business and vast global network. What's The Role? The Bloomberg CIRT is seeking a new member of its team to perform Incident Response duties such as Malware analysis, host and network forensic investigations, and threat hunting. This function is considered a key pillar in our security design. We are looking for a motivated information security professional who has both demonstrated experience and a passion for these disciplines. The CIRT is an open and collaborative environment where members work together to identify and address the latest in cyber security threats and attacks facing the company. As a member of the CIRT, you will be working with the latest cyber detection and defense technologies to address the dynamic and ever-changing world of cyber-attack detection and defense. We'll Trust You To: * Analyze malware and other artifacts while discovering and disseminating important indicators and techniques of an attack * Perform deep host and network level analysis in support of Incident Response * Review and analyze raw network captures and network activity logs to identify malicious and suspicious behaviors/signatures * Perform threat hunting activities to identify new indicators of compromise, techniques, tactics, and procedures * Create methods and tools to detect suspicious and malicious events occurring on our networks and systems * Action Intelligence reports to define and develop new detection techniques and criteria * Serve as a contact point for suspicious and malicious events escalated by CSOC You'll Need To Have: * Experience performing hands-on malware analysis of various file types including Microsoft office, PDF, and Windows binaries * Experience performing host and network analysis and Incident Response * Understanding of privilege escalation, persistence, and lateral movement techniques * Knowledge of common malware and exploit tools/techniques * Experience with malware and attacker techniques leveraged in enterprise environments * Static and dynamic analysis systems techniques and technologies * Understanding of enterprise network security controls and defenses * Scripting and automation skills * Experience with Windows, Linux, and Mac operating systems If This Sounds Like You: Apply if you think we're a good match. We'll get in touch to let you know what the next steps are, but in the meantime feel free to have a look at this: https://www.bloomberg.com/careers/about/ Bloomberg is an equal opportunities employer and we value diversity at our company. We do not discriminate on the basis of race, religion, colour, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status. Apply Now Senior Security Analyst – Cyber Incident Response TeamNew York Posted Oct 27, 2017 - Requisition No. 62992 Apply Now Our Team:We Protect Bloomberg. The Bloomberg Cyber Incident Response Team (CIRT) is responsible for the detection of threats and incident response across Bloomberg's diverse lines of business and vast global network. What's The Role? The Bloomberg CIRT is seeking a new member of its team to perform Incident Response duties such as Malware analysis, host and network forensic investigations, and threat hunting. This function is considered a key pillar in our security design. We are looking for a motivated information security professional who has both demonstrated experience and a passion for these disciplines. The CIRT is an open and collaborative environment where members work together to identify and address the latest in cyber security threats and attacks facing the company. As a member of the CIRT, you will be working with the latest cyber detection and defense technologies to address the dynamic and ever-changing world of cyber-attack detection and defense. We'll Trust You To: * Analyze malware and other artifacts while discovering and disseminating important indicators and techniques of an attack * Perform deep host and network level analysis in support of Incident Response * Review and analyze raw network captures and network activity logs to identify malicious and suspicious behaviors/signatures * Perform threat hunting activities to identify new indicators of compromise, techniques, tactics, and procedures * Create methods and tools to detect suspicious and malicious events occurring on our networks and systems * Action Intelligence reports to define and develop new detection techniques and criteria * Serve as a contact point for suspicious and malicious events escalated by CSOC You'll Need To Have: * Experience performing hands-on malware analysis of various file types including Microsoft office, PDF, and Windows binaries * Experience performing host and network analysis and Incident Response * Understanding of privilege escalation, persistence, and lateral movement techniques * Knowledge of common malware and exploit tools/techniques * Experience with malware and attacker techniques leveraged in enterprise environments * Static and dynamic analysis systems techniques and technologies * Understanding of enterprise network security controls and defenses * Scripting and automation skills * Experience with Windows, Linux, and Mac operating systems If This Sounds Like You: Apply if you think we're a good match. We'll get in touch to let you know what the next steps are, but in the meantime feel free to have a look at this: https://www.bloomberg.com/careers/about/ Bloomberg is an equal opportunities employer and we value diversity at our company. We do not discriminate on the basis of race, religion, colour, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status. Bloomberg New York NY

Cyber Security Analyst/Malware Analyst

Perimeterwatch