- UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with security tooling such as: zero trust networking, device encryption & key escrow, anti-malware tooling, PKI, patch management, and application allow/deny-listing. We are looking for a Site Reliability Engineer (SRE) to join the IT Operations Corporate Engineering team to build and maintain the tooling to secure and manage our fleet across multiple platforms (macOS, ChromeOS, Windows) and across various hardware types (laptop, desktop, mobile.
$140,250 - $165,000 a yearFull-timeRemoteExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support the tactical intelligence-to-detection pipeline, to include malware reverse engineering, TTP analysis, and association mapping in a TIP (threat intelligence platform) for future pivoting.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Conduct time-sensitive analysis during cyber investigations, including active threat hunting, malware analysis, and campaign enrichment. Regularly analyze malware reports to track adversary behaviors and support the construction of a TTP repository.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Must have strong technical skills proficiency in the following areas: network communication using TCP/IP protocols, basic system administration, basic understanding of malware (malware communication, installation, malware types), intermediate knowledge of computer network defense ops (proxy, firewall, IDS/IPS, router/switch) and open source information collection.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Acronis is revolutionizing cyber protection by unifying backup, disaster recovery, storage, next-generation anti-malware, and protection management into one solution. We are looking for a talented Social Media Manager to own our organic social media and influencer marketing efforts for global Acronis.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Design, configure, implement, troubleshoot, and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
In course of regular job duties, the selected candidate will gain exposure to many different enterprise-grade security technologies, which perform critical functions such as vulnerability scanning, malware detection, network intrusion prevention, firewall blocking, enterprise-wide incident response, and security information and event management (SIEM.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Focus on the DNS, DHCP, IPAM (DDI) model, to realize improved benefits inside network security and reliabilityProvide confidence and situational awareness to further the implementation of existing architectural frameworks already in developmentBuild DevSecOps into every stage of the designDevelop, implement, and provide enhanced security capabilities through DDI to minimize DDoS, malware, data exfiltration, and other DNS based security risks.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Working knowledge of cyber operational security, log analysis, netflow analysis, incident response, malware analysis, computer forensics, and/or cyber-crime. Maintain situational awareness of cyber activity by reviewing DoD, Intelligence Community and open source reporting for new vulnerabilities, malware or other threats that have the potential to impact the DoDIN.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with multiple solutions such as security orchestration, automation and response; SIEM; intrusion detection and prevention systems (IDS/IPS); threat intelligence platform; directory services; malware sandboxes; vulnerability management; IR playbooks; and endpoint/extended detection and response.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
One or more of the following technical certifications is preferred: GIAC Certified Incident Handler (GCIH), GIAC Certified Forensics Analyst (GCFA), or GIAC Reverse Engineering Malware (GREM), EC-Council Certified Security Analyst.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Possesses senior-level experience as a Malware Analyst with a background in cutting-edge cyberspace technologies. Media, Malware and Analysis (MMA) tasking includes the forensic analysis of media and software reverse engineering.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop and deploy dashboards and reporting to meet Liberty’s needs Perform incident response activities as directed Validate suspicious events and incidents using open-source and proprietary intelligence sources Perform as an escalation point for Tier I and II Analysts, as necessary, related to alerts Standardize and Maintain Incident Response Playbooks Perform forensic analysis on workstations, malware, malicious domains, etc.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Your role will also include supporting various IT related engagements such as supporting regulatory and compliance requirements (NERC CIP, SOX, PCI-DSS). You will be an active team member in daily Security Operations which includes Incident Monitoring & Response, Web Application Firewall administration, SIEM administration, Threat Intelligence gathering, Threat Hunting, Tabletop Exercise execution, Red & Blue team engagements, and Vulnerability Management, developing hardened configurations, and improving system protection configurations.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Cyber Security - Need to have experience working with cyber security tools for phishing/malware detection monitoring (ideally Crowdstrike or CheckPoint) Their ideal candidate will have 7+ years or systems administration (will need at least 4 years specific to systems administration) , technical support, infrastructure support, and/or networking, and 4 years of experience administrating a Windows server environment with Active Directory, and experience with Crowdstrike or CheckPoint on the cyber security side.
Full-timeExpandApply NowActive JobUpdated 7 days ago
malware job
FEATURED BLOG POSTS
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.