- UpvoteDownvoteShare Job
- Suggest Revision
Certifications such as GIAC Certified Incident Handler (GCIH), Certified Malware Analyst (CMA), Offensive Security Certified Professional (OSCP), or equivalent are highly desirable. As a Malware Analyst and Penetration Tester, you will play a critical role in detecting, analyzing, and mitigating advanced cyber threats to ensure the security and resilience of our organization and clients' systems.
Full-timeRemoteExpandApply NowActive JobUpdated 21 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support the tactical intelligence-to-detection pipeline, to include malware reverse engineering, TTP analysis, and association mapping in a TIP (threat intelligence platform) for future pivoting.
Full-timeExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Technical understanding in some of the following areas: network communication using TCP/IP protocols, basic understanding of malware (malware communication installation or malware types), or intermediate knowledge of computer network defense operations (proxy, firewall, IDS/IPS, router/switch, or open-source information collection.
Full-timeExpandApply NowActive JobUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Work will be executed in the National Capital Region, in Stennis, Mississippi; Chandler, Arizona; and other locations in the U.S and occasionally OCONUS. We're looking for a Forensics/Malware Analyst SME to conduct malware investigations and operations.
Full-timeExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Proficiency in cybersecurity tools and technologies such as malware analysis tools (e.g., IDA Pro, Ghidra), penetration testing frameworks (e.g., Metasploit, Burp Suite), and SIEM systems. Perform advanced malware analysis to identify, analyze, and reverse engineer malicious code and malware behavior.
Full-timeRemoteExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Leverage scanning tools (i.e., VirusTotal) to conduct suspicious file scanning; performing queries, pivoting on indicators, and malware analysis on characteristics (Message-Digest Algorithm 5 (MD5), Secure Hash Algorithm 1 (SHA1), file size, file name, file paths, etc.
Full-timeExpandApply NowActive JobUpdated 24 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Fundamental knowledge of NIST, MDM, OWASP, PowerShell/Python/JavaScript, MacOS, malware analysis, LOLBAS, vulnerability management, WAF, CIS Benchmarks. Fundamental knowledge of NIST, MDM, OWASP, PowerShell/Python/JavaScript, MacOS, malware analysis, LOLBAS, vulnerability management, WAF, CIS Benchmarks.
$40 - $50ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Respond to malware, intrusion detection and other notifications generated by HBSS. Prepare for and coordinate any Cybersecurity inspections for the organization such as: Security Control Assessor Validator (SCV), Command Cyber Readiness Inspection (CCRI), Department of the Army Inspector General (DAIG), Cyber Protection Brigade (CPT), and others as required.
Full-timeExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of networking protocols, malware analysis, and digital forensics. Relevant certifications such as CISSP, GIAC, CISM, CHFI, GCFA, or OSCP are highly desirable. Demonstrated knowledge of forensic tools including, but not limited to, Forensic Case Notes, AccessData Forensic Toolkit, Magnet Axiom, EnCase, X-Ways, REMnux and Sift.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Expertise in implementing, administrating and operating information security technologies such as firewalls, IDS/IPS, SIEM, Antivirus, network traffic analyzers and malware analysis tools. The Identity Manager/IAM engineer is responsible for managing access to the DCAS system and provisioning accounts through Oracle IAM.
Full-timeRemoteExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience and/or familiarity with the following network protection devices: Firewalls, intrusion detection and prevention systems (IDS/IPS), log analysis, malware analysis, network traffic flow and packet analysis.
Full-timeExpandApply NowActive JobUpdated 25 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Must have knowledge and skills to administer, support and maintain security tools such as Splunk Enterprise Security/SIEM for log analysis and event correlation, McAfee ePO for endpoint protection (malware and threat prevention), McAfee DAM for database activity monitoring, etc.
Full-timeExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Our Security Incident Management Technical Sr. Analyst - Amazon Web Services (AWS) is a member of a service team with upwards of four (4) personnel within the Information Security Operations group that are focused on incident response, data spillage response, eDiscovery/legal retention, phishing/spam/malware response, and threat hunting.
$129,700 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Perform analysis and investigation of endpoint alerts to include malware, virus, rogue system detection, and removable media. Perform overall analysis and monitor Threat Events in McAfee/Trellix ePO, Splunk Enterprise, Palo Alto Firewall/IDPS and RSA Authentication Manager.
$146,875 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Nessus Tenable Vulnerability Management Tool Experience. Experience in conducting vulnerability assessments using Tenable (ACAS), SCAP benchmark scans, and subsequent remediation of security control deficiencies.
$146,875 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago
malware job in Washington, DC
FEATURED BLOG POSTS
How Long Does it Take to Hear Back from a Job?
Are you applying for your very first job? Maybe you’re anticipating your termination from your current role and want to be proactive. Either way, waiting to hear back on your job application can be stressful. If time has passed since you applied, you may wonder how long does it take to hear back from a job. Well, the answer is... it depends.
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.
The Quiet Quitting Phenomenon
The term, quiet quitting, was coined in 2009, but only now is it gaining traction as young Millennials and Gen Z workers are experiencing record levels of burnout. With the pandemic and the state of the economy, young employees are feeling the pressure. So, quiet quitting comes into effect when that pressure is exasperated by work stress and no managerial support.
How Does Salary Range Work (With Examples)
What are your salary expectations? Do you know? Establishing a salary that compensates you fairly and keeps you happy at work can feel like taking a shot in the dark. And employers sure don’t make learning budgets easy!
Guide to Hiring a Teenager
Teenagers are full of life. They bring energy and adaptability that may be hard to get from older workers, but does that mean that hiring teens is beneficial? Well, it depends. As you debate whether or not you should integrate teenagers into your workforce, there are some things that you should know first.