- UpvoteDownvoteShare Job
- Suggest Revision
Requires one of the following : Global Information Assurances Certification (GIAC) Certified Forensic Analyst (GCFA) certificate or Certified Reverse Engineering Malware (GREM) certificate.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Certifications such as GIAC Certified Incident Handler (GCIH), Certified Malware Analyst (CMA), Offensive Security Certified Professional (OSCP), or equivalent are highly desirable. As a Malware Analyst and Penetration Tester, you will play a critical role in detecting, analyzing, and mitigating advanced cyber threats to ensure the security and resilience of our organization and clients' systems.
RemoteExpandUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Working knowledge of cyber operational security, log analysis, netflow analysis, incident response, malware analysis, computer forensics, and/or cyber-crime. Advanced Certifications such as SANS GIAC/GCIA/GCIH, CISSP or CASP.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Security-related technologies and their functions (IDS, IPS, FW, WAF, SIEM, DLP, Proxy, next gen anti-malware etc. MBA, CISSP, CISM, GCHI, CEH, CCNA, or GIAC are preferred. , malware operation and indicators, current threat landscape (threat actors, APT, cyber-crime, etc.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Proficiency in cybersecurity tools and technologies such as malware analysis tools (e.g., IDA Pro, Ghidra), penetration testing frameworks (e.g., Metasploit, Burp Suite), and SIEM systems. We are looking for a skilled and experienced Technical Cyber Incident Responder with expertise in malware analysis and penetration testing to join our dynamic team.
RemoteExpandUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Must have, or be able to obtain within 3 months, one of the following certifications: CERT Certified Computer Security Incident Handler (CSIH), ECC Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), GIAC Information Security Fundamentals (GISF), or ISC2 Certified Information System Security Professional (CISSP.
ExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Required IAT Certs: one or more of the following: CASP+, CISA, CISSP, GCIH, CEH, GIAC, GCIA, CCNP-Security. The Engineer will recommend new tools/technologies to improve network visibility, support Incident Response and Forensic operations as required to include static/dynamic malware analysis and reverse engineering, and author and maintain scripts for threat detection and automation.
Full-timeExpandApply NowActive JobUpdated 17 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Maintain situational awareness of cyber activity by reviewing DoD, Intelligence Community and open source reporting for new vulnerabilities, malware or other threats that have the potential to impact the DoDIN.
Full-timeExpandUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
One or more of the following certifications: OSCP, CEH, GIAC, GCIH, GCFA, GREM. 5+ years of experience with incident response, security operations, malware analysis, or threat hunting. Conduct time-sensitive analysis during cyber investigations, including active threat hunting and malware analysis.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Possess current security certifications: Certified Information System Security Professional (CISSP) or Government Security Engineer Certification (GSEC); Certification and Accreditation Professional (CAP); Certified Information Security Manager (CISM); GIAC Security Leadership Certificate (GLSC); Certified Ethical Hacker (CEH.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Must hold at least one of the following certifications: CompTIA Security+, CISSP, ISACA CISA, GIAC GSEC, GIAC GSNA, GIAC GPEN, CEH, CAP, CASP+, CRISC, or CCSK. Knowledge of major cloud platforms (Azure/ Amazon Web Services [AWS]), virtualization, networking devices (e.g., routers and switches), web services (e.g., IIS, Apache Tomcat), network security appliances (e.g., firewalls, VPNs), databases (e.g., Microsoft SQL), and intrusion prevention/ anti-malware software.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Maintain situational awareness of cyber activity by reviewing DoD, Intelligence Community and open source reporting for new threat actors, vulnerabilities, malware or other threats that have the potential to impact the DoDIN.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Must have proficient knowledge with three or more of the following technologies: Application / stateful / UTM firewalls; SIEM; DLP; Web content filtering; Web application firewalls (WAF); Vulnerability scanning and penetration testing; IPS/IDS; Security Operations Center operations; Wireless Networking; UNIX, AIX & Solaris, Linux, Windows Server Operating Systems; Endpoint and Malware.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Have at least one of the following certifications: SANS GIAC: GCIA, GCFA, GPEN, GWAPT, GCFE, GREM, GXPN, GMON, GISF, or GCIH, ISC2: CCFP, CCSP, CISSP CERT CSIH, EC Council: CHFI, LPT, ECSA; Offensive Security: OSCP, OSCE, OSWP and OSEE; Defense Cyber Investigative Training Academy: FTK WFE-FTK, CIRC, WFE-E-CI, FIW.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
CISSP, GIAC, CEH, CCENT, CCNA, CCNP, CCIE, EnCE, CCE, CFCE, GCFA, GCFE, CSFA, MCSE (Cloud, Mobility Server Infrastructure Enterprise Devices and Apps), IBM Certified Administrator in any security realm, IBM Certified Solution Provider in any security realm, Red Hat Certified System Administrator, Red Hat Certified Security Specialist, CSE – Specialty in Networking and Security – HP-UX, CSE – Specialty in Virtualizaiton – HP –UX,BSD Professional.
ExpandApply NowActive JobUpdated 2 days ago
giac malware jobs
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra: