- UpvoteDownvoteShare Job
- Suggest Revision
Certifications such as GIAC Certified Incident Handler (GCIH), Certified Malware Analyst (CMA), Offensive Security Certified Professional (OSCP), or equivalent are highly desirable. As a Malware Analyst and Penetration Tester, you will play a critical role in detecting, analyzing, and mitigating advanced cyber threats to ensure the security and resilience of our organization and clients' systems.
RemoteExpandUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Position Description: Global InfoTek Inc., is looking for an experienced Vulnerability Researcher/Reverse Engineer to analyze and/or reverse engineer the behavior of potentially malicious code using both static and dynamic tools and techniques and conduct detection and analysis of malware and malware communication techniques in support of a cyber investigations/counterintelligence agency.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Security-related technologies and their functions (IDS, IPS, FW, WAF, SIEM, DLP, Proxy, next gen anti-malware etc. , malware operation and indicators, current threat landscape (threat actors, APT, cyber-crime, etc.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in performing forensic analysis, malware analysis, threat hunting, and threat intelligence. Perform incident triage and investigation, using threat intelligence, forensic analysis, malware analysis, and other methods.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Malware Analyst - TASO. - Reverse engineer malware samples through the use of debugging tools. TMC Technologies is in search of a Malware Analystto support a federal client in Rosslyn, VA. The candidate must be a US Citizen with the ability to obtain an interim Secret clearance before start date due to federal contract requirements.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Technical depth in one or more specialties including: application security, infrastructure security, digital forensics, malware analysis, threat hunting or some combination thereof. We value broad and deep technical knowledge, specifically in the fields of forensics, malware analysis, network security, application security, threat hunting, and threat intelligence.
ExpandUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
CrowdStrike has always been industry pioneer in its use of Machine Learning and Artificial Intelligence: from our first to market use of ML for malware classification, to our cutting-edge Generative AI powered natural-language interface, Charlotte.
RemoteExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Malware Reverse Engineer, Lead Associate Peraton Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. Reverse-engineer malware and incorporate analysis results into detailed reporting to include behavior, identified infrastructure used for command and control, and mitigation techniques.
ExpandUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Must have strong analytical and technical skills in computer network defense operations, ability to lead efforts in Incident Handling (Detection, Analysis, Triage), Hunting (anomalous pattern detection and content management) and Malware Analysis.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
5 years of cybersecurity experience with knowledge of any of the following: DevOps, DevSecOps , Security Engineering, SOAR, Threat Hunting, Malware Analysis, or Incident Response. Automate threat research tasks, such as threat intelligence collection, malware analysis, and detection engineering.
ExpandUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Endpoint Protection (Anti-Virus/Malware, EDR, DLP, UEFI Security, Disk Encryption, OS, Patch Management, TPM, Sandboxing) Malware remediation (Ransomware, Trojans, Worms, PUPs, Fileless, C&C, Bots, Crypto, Logic Bomb, Spyware, Keylogger, RAT, Rootkit, Backdoor.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of current Cybersecurity products, information data protection, DLP, Insider Threat, advanced malware detection, SIEM , and forensic tools. Strong background in a wide range of Cybersecurity including current advanced threats, threat protection, data protection, cloud security, malware protection and/or incident response.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Proofpoint thrives on the invaluable contributions of our diverse workforce, which encompasses a kaleidoscope of lived experiences, thoughts, perspectives, and professional expertise. Proofpoint is seeking an experienced and dynamic Enterprise Security Advisor/Architect to focus on Information Protection (Endpoint DLP, ITM, CASB, Web, Isolation) for Fortune 500 organizations throughout the Western US and Canada.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
You will respond to security events, conduct analysis of threats such as malware and intrusion attempts, and provide security services to safeguard highly sensitive data. Experience in working with vulnerability management solutions, SIEM solutions, endpoint technologies such as CrowdStrike and similar industry technology solutions.
Full-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 10 days ago
malware job
FEATURED BLOG POSTS
How to Make a Job Offer More Competitive
Money alone makes it hard to attract and retain top-notch candidates, especially when you are competing with larger businesses and corporations in your industry. So, instead of focusing on money, figure out how to make a job offer more competitive when you can't offer more money.
5 Ways to Stretch Your Hiring Budget
Many businesses across the country have adjusted business operations to make it through the pandemic. After a period of hardship, many business owners, like yourself, are ready to start recruiting and rebuilding a bigger, more skilled workforce - only now you have to do it with a smaller hiring budget.
How to Ask for a Raise at Work
Here we go again; it’s time to talk money. Whether you’re one year in at a new company or approaching year five on the same team, learning how to ask for a raise should be part of your long-term career plan. These conversations are rarely fun (thanks to society, which has conditioned us to believe that money is taboo), but they are necessary if you want to, well, get paid what you’re worth. Trust us, there’s a lot of money on the table for taking. Below, we’ll discuss tips on timing, approach, and follow-up.
Technology in the Workplace: How to Improve your HR Function with AI
It’s safe to say that the last two years have brought fundamental changes to the way we work and do business. Companies have relied on technology in the workplace to digitize their services and build a remote-friendly infrastructure that could prepare them for the future.
How to Maximize Action Verbs in Your Resume
Writing a resume that stands out takes more than using keywords and savvy formatting. It’s not just about having an impressive list of accomplishments. It’s also about how you position them using action verbs and deliberate word choice. So if you are looking for a way to craft a resume that stands out and gets calls back? Start by sprucing up your resume with captivating action verbs.
What is Your Desired Job Title?
You’ve decided to look for a new job. So now comes the question — what is your desired job title? There are lots of considerations to think through when deciding on the right title for your next role.
4 Things to Consider When Building a Global Workforce
The rise of remote work has given employers a unique chance to rethink how they approach workforce management. This ranges from rethinking the size and design of their office space to updating their tech stack to accommodate different working styles. It has created new opportunities for companies of all sizes to expand their hiring pool and look for top talent on a global scale.