- UpvoteDownvoteShare Job
- Suggest Revision
Services include malware and implant analysis, and forensic artifact handling and analysis. Services include incident handling/incident response, malware and analysis and signature development, and forensic artifact handling and analysis.
$68,400 - $143,700 a yearFull-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Investigate and analyze of all data sources, to include Internet, client reporting, security events, firewall logs, forensic hard-drive images, and other data sources to identify malware, misuse, unauthorized activity, or other cyber security related concerns.
Full-timeExpandApply NowActive JobUpdated 20 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Requires one of the following : Global Information Assurances Certification (GIAC) Certified Forensic Analyst (GCFA) certificate or Certified Reverse Engineering Malware (GREM) certificate.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrable skills in cyber investigative techniques, including threat analysis, malware analysis, and digital forensics. Knowledge of and experience with standard network logging formats, network management systems and network security monitoring systems, security information and event management, network packet analysis tools and forensic analysis tools.
Full-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
More specifically, we are looking for technical cybersecurity experts with experience in all or some of the following: intelligence collection, incident response, insider threat analysis, network operations, emerging cyber policy, security operations (malware analysis, specialized cloud expertise, forensic experts, penetration testing, and application testing.
ExpandUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of current Cybersecurity products, information data protection, DLP, Insider Threat, advanced malware detection, SIEM, and forensic tools. Strong background in a wide range of Cybersecurity including current advanced threats, threat protection, data protection, cloud security, malware protection and/or incident response.
ExpandUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with host-centric tools for forensic collection and analysis (SleuthKit, Volatility Framework, FTK, Encase, etc.) Demonstration of leadership abilities across threatenvironments as well as a strong comprehension of cloud security, malware, emerging threats and calculating risk will be critical to success.
ExpandUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise. Malware Analysis: ability to perform static and dynamic malware analysis to understand the nature of malware.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with malware and reverse engineering (Dynamic and static analysis) Cloud technology (SaaS, IaaS, PaaS) and associated digital forensics and incident response techniques. This role is a cyber security Incident Responder driven to create and implement enterprise-class response strategies, with a focus on identifying and driving future-state direction of the Response program at GE Aerospace working with GEs global CIRT team.
ExpandUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
QUALIFICATIONS EXPERIENCE & EDUCATION: Knowledge of Enterprise Networks & Security infrastructure, Communication and internet security systems, Firewalls, Intrusion Protection Systems, Remote Access VPN, Proxy, Wireless Security, NAC, Enterprise ID Management systems, Database, computer systems, security event analysis and forensic investigations.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As a Security Consultant, you could work on engagements including assisting clients in navigating technically complex and high-profile incidents, performing forensic analysis, threat hunting, and malware triage.
ExpandUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Forensic Malware Analyst. Has developed reports forensic or malware analysis related. Conducts dead box forensic using tools like encase, forensic tool kit or autopsy.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Security-related technologies and their functions (IDS, IPS, FW, WAF, SIEM, DLP, Proxy, next gen anti-malware etc. , malware operation and indicators, current threat landscape (threat actors, APT, cyber-crime, etc.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support Incident Response and Forensic operations as required to include static/dynamic malware analysis and reverse engineering. Should have 5 years of experience serving as a digital media analyst or as a computer forensic analyst.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Detailed understanding of APT, Cyber Crime and other associated tactics. Perform daily response operations with a schedule that may involve nontraditional working hours - act as escalation point and subject matter expert during AWS cloud incidents.
ExpandUpdated 8 days ago
malware forensic jobs
FEATURED BLOG POSTS
Brand Reputation 101
People's initial perception of your organization is also known as your brand reputation. Your brand rep either encourages or discourages people from engaging with your company. This means the way people view your company will affect sales and even recruiting efforts.
Recruiting in a Tight Market
As a recruiter or employer, you know how much the economy affects your recruitment and retention efforts. You aren't just in competition with companies in your industry, but you are also fighting against inflation, recession, unemployment rates, and so much more.
How to Build a Candidate Persona
A candidate persona is a semi-fictional representation of your ideal candidate. Building a candidate persona is one of the best methods employers use to ensure their sourcing, recruiting, and hiring processes are focused. Knowing exactly what you're looking for streamlines everything and helps increase hiring confidence. So here's how to create a candidate persona and how to use it.
How to Get Into The Trades: Step-by-Step Guide
Getting a trade job can be a great career move if you like variety and prefer to learn on the job instead of in an academic setting. A trade job can offer security and be a lucrative career path as the demand for skilled trade workers continues to grow.
How do Good Interviewers Prepare for Interviews?
Just like candidates take the time to research you and your company, you should take the time to prepare for the interview. Preparing for the interview doesn't just reflect well on your employer brand and create a better candidate experience. Preparation also helps prevent bad hiring decisions. Bad hiring decisions are usually a result of poor execution during the hiring process. However, going into an interview fully prepared and ready to evaluate candidates will help avoid bad hires. So, here are 6 interview preparation tips for employers.
How to Get a Union Job? A Step-by-Step Guide
A union job can significantly impact your job security, pay, and employment benefits. Whether this is your first job or you have years of experience, a union job can offer much-needed protection in a labor market where employees are hired and fired at will.
Should I Hire for Potential Over Experience?
The workforce is shifting every day. In fact, research from the World Economic Forum (WEF) shows over half of employees around the world will need to upskill or reskill by 2025. The rapid rise of digital literacy, automation, and new technologies will quickly supersede businesses that don't train ahead of the curve. With the dire need to invest in training, it's evident that hiring someone with experience isn't that much different than hiring someone without it.