- UpvoteDownvoteShare Job
- Suggest Revision
Support the tactical intelligence-to-detection pipeline, to include malware reverse engineering, TTP analysis, and association mapping in a TIP (threat intelligence platform) for future pivoting.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Perform malware, threat, and attack vector analysis. Configure and maintain complex security systems (HSM farms, MPC-based systems, cryptosystems, key management systems, blockchain/DLT/DAG nodes, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with common attack vectors and defensive methods against modern enterprises (phishing, ransomware, malware, DoS/DDoS, SQL injection, cross-site scripting, etc. Proficiency in core principles of networking (TCP/IP, routing/switching, VLANs, NAT, DNS, DHCP) and applied cryptography (symmetric/asymmetric encryption, hashing, SSL/TLS, SSH, PKI, IPSec.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
5+ years of experience in cyber security engineering (malware, antivirus, behavioral analysis, forensics) Certified Information Systems Security Professional (CISSP) or Certified Cloud Security Professional (CCSP) or AWS Certification.
$274,800 a yearRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experienced subject matter expert with hands on experience with endpoint security technologies like Endpoint Detection Response (EDR), Anti-malware solutions & Data Loss Prevention. Experience with Group Policy and Intune security related configuration and management.
$55 - $60ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience implementing security solutions for enterprises (e.g., threat detection and hunting, malware intelligence, cloud security posture management, or identity and access management systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This role responds to computer security breaches, virus and malware infections, and cyber security threats. Responsible for deploying and managing security SSL Certificates, MFA Infrastructure, and.1X Support and comply with the Institute's Information Security Management System (ISO / IEC.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Manage, maintain, and monitor security technologies such as vulnerability scanning solutions, IDS/IPS, anti- virus technologies, SIEM technologies, host forensics and malware analysis, web application firewalls and proxy solutions.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
In-depth experience in five with a preference of seven or more of the following: networking protocols, cloud technologies, virtualization, routers, security stacks, incident response, Threat Intelligence Platforms, BlueCoat, FireEye, mobility, penetration testing, Authorization and Accreditation (A&A), EnCase/malware analysis, network packet capture analysis.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Security Event Monitoring, Network Event monitoring, Email Header Analysis, Packet Capture inspection, Malware Triage & Analysis, SIEM (Splunk) & TIP Experience. The IT Cyber Security Operations Monitoring Team is seeking consultants to perform Tier 2 SOC follow-up and remediation activity on escalated incidents.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience with malware, threat intelligence, and/or sandbox analysis. Founder George Kurtz realized that a brand new approach was needed — one that combines the most advanced endpoint protection with expert intelligence to pinpoint the adversaries perpetrating the attacks, not just the malware.
RemoteExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge and understanding of cyber security standard methodologies and general security concepts like password rotation, access restriction and malware detection. Application Support Engineer, Mainframe, COBOL, ITIL Change, Incident and Problem Management, JCL, DB2, DB2 Stored Procedures, CICS, SPUFI, File aid, Mainframe Scheduling, Job abends, Predecessor/Successor, Unix, Linux, SQL/PLSQL, Oracle, Snowflake, Splunk, DynaTrace, Thousand Eyes, Grafana, Selenium, HiPam IBM Zolda, AWS Services, S3, EC2, Lambda, SQS, IAM Roles, Azure, OpenShift, RDS Aurora, Postgress, Scheduling Tool, CA AutoSys, Control-M.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with common attack vectors, malware analysis techniques, cyber threat intelligence frameworks, and CIS benchmarks and controls. Familiarity with common attack vectors, malware analysis techniques, cyber threat intelligence frameworks, and CIS benchmarks and controls.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Technical Qualifications (Mainframe): Mainframes solve and support skills (COBOL, JCL, DB2, DB2 Stored Procedures, CICS, SPUFI, File aid) Mainframe. Contribute in Monthly Service Reviews (MSR) with Development partners to go over KPI metrics.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experienced in threat and vulnerability management, penetration testing, and SecOps (intrusion detection, security logging, malware analysis, and forensics). Experienced in threat and vulnerability management, penetration testing, and SecOps (intrusion detection, security logging, malware analysis, and forensics.
$102,000 - $180,000 a yearFull-timeExpandApply NowActive JobUpdated Today
malware job in North Arlington, NJ
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.