- UpvoteDownvoteShare Job
- Suggest Revision
Certifications such as GIAC Certified Incident Handler (GCIH), Certified Malware Analyst (CMA), Offensive Security Certified Professional (OSCP), or equivalent are highly desirable. As a Malware Analyst and Penetration Tester, you will play a critical role in detecting, analyzing, and mitigating advanced cyber threats to ensure the security and resilience of our organization and clients' systems.
RemoteExpandUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Position Description: Global InfoTek Inc., is looking for an experienced Vulnerability Researcher/Reverse Engineer to analyze and/or reverse engineer the behavior of potentially malicious code using both static and dynamic tools and techniques and conduct detection and analysis of malware and malware communication techniques in support of a cyber investigations/counterintelligence agency.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Security-related technologies and their functions (IDS, IPS, FW, WAF, SIEM, DLP, Proxy, next gen anti-malware etc. , malware operation and indicators, current threat landscape (threat actors, APT, cyber-crime, etc.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in performing forensic analysis, malware analysis, threat hunting, and threat intelligence. Perform incident triage and investigation, using threat intelligence, forensic analysis, malware analysis, and other methods.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Malware Analyst - TASO. - Reverse engineer malware samples through the use of debugging tools. TMC Technologies is in search of a Malware Analystto support a federal client in Rosslyn, VA. The candidate must be a US Citizen with the ability to obtain an interim Secret clearance before start date due to federal contract requirements.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Technical depth in one or more specialties including: application security, infrastructure security, digital forensics, malware analysis, threat hunting or some combination thereof. We value broad and deep technical knowledge, specifically in the fields of forensics, malware analysis, network security, application security, threat hunting, and threat intelligence.
ExpandUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
CrowdStrike has always been industry pioneer in its use of Machine Learning and Artificial Intelligence: from our first to market use of ML for malware classification, to our cutting-edge Generative AI powered natural-language interface, Charlotte.
RemoteExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Malware Reverse Engineer, Lead Associate Peraton Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. Reverse-engineer malware and incorporate analysis results into detailed reporting to include behavior, identified infrastructure used for command and control, and mitigation techniques.
ExpandUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Must have strong analytical and technical skills in computer network defense operations, ability to lead efforts in Incident Handling (Detection, Analysis, Triage), Hunting (anomalous pattern detection and content management) and Malware Analysis.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
5 years of cybersecurity experience with knowledge of any of the following: DevOps, DevSecOps , Security Engineering, SOAR, Threat Hunting, Malware Analysis, or Incident Response. Automate threat research tasks, such as threat intelligence collection, malware analysis, and detection engineering.
ExpandUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Endpoint Protection (Anti-Virus/Malware, EDR, DLP, UEFI Security, Disk Encryption, OS, Patch Management, TPM, Sandboxing) Malware remediation (Ransomware, Trojans, Worms, PUPs, Fileless, C&C, Bots, Crypto, Logic Bomb, Spyware, Keylogger, RAT, Rootkit, Backdoor.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of current Cybersecurity products, information data protection, DLP, Insider Threat, advanced malware detection, SIEM , and forensic tools. Strong background in a wide range of Cybersecurity including current advanced threats, threat protection, data protection, cloud security, malware protection and/or incident response.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Proofpoint thrives on the invaluable contributions of our diverse workforce, which encompasses a kaleidoscope of lived experiences, thoughts, perspectives, and professional expertise. Proofpoint is seeking an experienced and dynamic Enterprise Security Advisor/Architect to focus on Information Protection (Endpoint DLP, ITM, CASB, Web, Isolation) for Fortune 500 organizations throughout the Western US and Canada.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
You will respond to security events, conduct analysis of threats such as malware and intrusion attempts, and provide security services to safeguard highly sensitive data. Experience in working with vulnerability management solutions, SIEM solutions, endpoint technologies such as CrowdStrike and similar industry technology solutions.
Full-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 10 days ago
malware job
FEATURED BLOG POSTS
Why is Non-Verbal Communication Really Important?
In a world where words and phrases rule daily communication, you may wonder why non-verbal communication is important. Whether you realize it or not, you communicate more with nonverbal actions than you do with verbal communication. When you interact with your peers, people are reading your body language, facial expressions, voice, and many other factors that help fill in blanks that words can't fill.
Making Hybrid Work More Efficient
Covid was a catalyst for change in the work environment. Keeping people safe and helathy was the initial goal for employers, but the unintended result was the considerable demand in remote work. Now, onsite work has been dramatically altered to remote work, which is now transforming into a combination of the two: hybrid work.
How Can HR Technology Help Retain Employees?
Human resources' rapid adoption of technology has led to new ways of streamlining human capital management. Based on the IEE Global Study, these technologies changed how HR handled recruitment and retention in 2022. This includes tech like
Why is Time Management Important? 10 Crucial Importances of Time Management
We’ve all been there before. What starts as a relaxing evening scroll quickly becomes a full-blown binge. You blink, and it’s midnight - throwing off your entire next day before it even starts. And at its worst, this indulgence might leave you feeling behind on things you planned to finish that night. This is why time management is important.
Minimizing Candidate Renegs During the Hiring and Onboarding Process
Candidates reneging on job offers or during the onboarding process can be a frustrating experience for any recruiter. In a talent-driven job market, it’s common for candidates to have more than one job offer to consider. It becomes a race against time to see which organization can offer the best career experience, compensation, and circumstances that secure the right employees.
10 Reasons to Be on Time at Work
Being punctual at work may not be something you’ve given much thought to, but it’s the foundation for building a successful career. All of your technical or job-specific skills will be in vain if your peers and superiors can’t trust you to show up on time and do the work. In fact, Simon Sinek once famously said that
10 Importancies of Setting Realistic Goals
We’ve all heard how important it is to set professional and personal goals. Developing and establishing goals keeps us motivated and moving forward in life. But not all goals are created equal. If you’re chasing goals that are too lofty, you’ll end up disappointed when you cannot reach them. Setting goals that are achievable and measurable is the key to success.