- UpvoteDownvoteShare Job
- Suggest Revision
Subject matter expertise in at least one of the following areas: Cyber Threat Hunting, Malware Analysis & Reverse Engineering, Cyber Threat Intelligence, Digital Forensics, Incident Response, Penetration Testing.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
5+ years of experience with incident response, security operations, malware analysis, or threat hunting. Conduct time-sensitive analysis during cyber investigations, including active threat hunting and malware analysis.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Windows/Linux/macOS systems, cyber threat hunting, malware analysis tools and. Malware Analysis&Reverse Engineering, Cyber Threat Intelligence, Digital. best practices such as NIST CSF, PCI-DSS, CIS CSCs, MITRE ATT&CK, Cyber.
Full-timeExpandApply NowActive JobUpdated 2 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Provides architectural strategy and subject matter expertise in a broad range of IT security disciplines, including network security, data protection, malware defenses, security analytics, identity and access management, compliance, endpoint and mobile security, third-party software-as-a-service integration, infrastructure as a service, cloud, and secure coding lifecycle.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Monitor, review, and provide security guidance for Network security tools and associated access mediums such as Network access controllers (NAC), gateway anti-malware and enhanced authentication.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provide technical consulting for Threat Prevention (Web Proxy and Malware Inspection solutions) and Perimeter Security (Firewall solutions) in support of application teams and operations teams responsible for remediation activities, deployment of new connectivity requirements (i.e. rule designs), reporting and general consulting.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Malware inspection (preferably FireEye malware detection NX/VX) Professional level certifications in networking or network security technologies is a plus (i.e. CCIE, CCNP, Security+, CCSP, CISSP, or similar.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
You can translate investigative capabilities into effective automation, instrumentation, and tooling, based on an understanding of how analysts need to synthesize disparate sets of data from sources such as malware, cyber attack patterns, and closed and open-source intelligence.
Part-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Maintain and proactively improve common security control practices such as: OS patching and hardening, intrusion detection (network, anti-malware), logging, and data loss prevention. Maintain and proactively improve common security control practices such as: OS patching and hardening, intrusion detection (network, anti-malware), logging, and data loss prevention.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. Work with Vendor Management to act as SME on Vendor BCP due diligence and clear BCP/DR SIG questions for the due diligence process.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Focuses on critical systems within Vanguard’s network to detect, respond and handle incidents related to unauthorized activity, malware, and APTs. Works with Incident Management and Threat management to follow incident response procedures to ensure proper detection, mitigation controls.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
With the mission of capturing the biggest market share in the area of cyber security, network security, endpoint security, threat research, malware research, cloud security, we work together for a common goal of shaping the company's future by designing and building the best in class robust and scalable security products for consumer and enterprise customers.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Analyzes endpoint including logging, EDR, IPS and DLP tools. Escalates internal threat issues to the Insider Threat Team. Identifies Tactical Intelligence relevant to Vanguard systems. Working knowledge of AWS, Azure or GCP.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Infrastructure (server, database, network, operating system, mobile devices), or cyber security (firewall, IDS/IPS, DLP, Proxies, anti-malware, CASB, email security, remote access, security baselines, SIEM, PKI, data encryption/tokenization, Cloud security, security, or cyber security.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Preferred designations include CISA (Certified Information Systems Auditor), CISSP (Certified Information Security Systems Professional), CISM (Certified Information Security Manager), or other relevant business designations.
Full-timeExpandApply NowActive JobUpdated 5 days ago
malware job in Addison, TX
FEATURED BLOG POSTS
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.
What is Seasonal Employment?
Depending on where you are in your career, you might have first-hand experience with seasonal employment. Seasonal employment can be a great way to expand your skill set and earn extra cash while helping businesses meet seasonal increases in demand.
How to Avoid a Bad Hire
"A new employee who doesn't meet the minimum performance, quality, and culture fit standards you set when you began sourcing and recruiting. Additionally, bad hires will immediately show signs of self-interest instead of an interest in their role and the company."
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.