The Senior Cyber Security Malware Analyst will lead team efforts to develop and extract IOCs and ATT&CK techniques from malicious binaries and use the resulting data to inform Threat Operations Team efforts to create detection logic. The Malware Analyst will also work closely with SIRT and Threat Intelligence to coordinate and integrate intelligence into operational processes. This role will also work closely with the Shield product team, performing deep analysis on malware and assisting with Shield product detection.
-
Design, implement and maintain a malware lab that is both cloud and bare metal based and continue to develop customized technical solution sets to monitor and analyze malware
-
Lead efforts to analyze executables and malicious files
-
Investigate computer systems to identify malware infections or evidence of malware related activity
-
Preform ad hoc memory and disk forensics
-
Produce detailed technical reports and presentations in support of malware investigations
-
Maintain proper evidence custody and control procedures, documents procedures and findings
-
Perform malware and intrusion analysis, host-based forensics and threat intelligence collection
-
Perform incident response duties, including log and data collection and preservation and host and network forensics and provide collaboration and tactical communications, including situation reports for the team, management, administrators, and end-users
-
Act as a subject matter expert for inquiries by internal IT engineering teams
-
A passion for research, and uncovering the unknown about internet threats and threat actor
-
Shift work may be required to support stakeholders in the US
-
4+ years of recent operational security experience (SOC, Incident Response, Malware Analysis, IDS/IPS Analysis, etc) ( with 6+ years overall IT experience)
-
Bachelor's degree in Information Technology, related discipline or relevant work experience
-
Experience performing the role of a technical lead in complex IT/Security Projects
-
Experience designing and building an isolated malware analysis environment
-
Experience in identifying and defeating malware defense mechanism such as anti-reverse, anti-debug, and anti-virtual machine
-
Experience and knowledgeable of: Encase, IDA Pro disassembler, Ollydbg & Hex-Rays Decompiler, user and kernel mode debuggers, common binary file formats. dynamic analysis tools, network analysis tools
- Relevant Technical Security Certifications (GIAC, EC-Council, Offensive Security, etc) will be an asset
-
Demonstrated knowledge of Linux/UNIX, Mac & Windows operating systems
-
Detailed understanding of the TCP/IP networking stack & network technologies
-
Working knowledge of full packet capture PCAP analysis and accompanying tools (Wireshark, etc.)
-
Nominal understanding of regular expression and proficient in programming (.NET, C/C++) and scripting languages (e.g. Perl, Java, or Python)
-
Expert knowledge of memory forensics to identify and understand memory resident malware