- Microsoft Corporation (Redmond, WA)
- …is a global team of security researchers, advanced threat hunters, and agile malware responders at the forefront of protecting the Microsoft ecosystem from emerging ... products? Do you want to work on cutting edge malware analysis systems? Are you committed to helping Microsoft...Microsoft customers keep their computers secure and combating evolving malware threats? We are looking for a Senior Security… more
- Microsoft Corporation (Redmond, WA)
- …Tooling** , interested in leading some of the most experienced Red Team malware developers in the industry. This group is responsible for delivering critical Red ... teams + 1+ year of experience in Red Teaming, malware development or offensive cyber operations **Other Requirements:** +...teams + 3+ years of experience in Red Teaming, malware development or offensive cyber operations Software Engineering M5… more
- Grant PUD (Ephrata, WA)
- …and security software including IDS, Active Directory, DNS, anti-virus, malware detection, vulnerability scanners, baseline management, backup and recovery, remote ... and security software including IDS, Active Directory, DNS, anti-virus, malware detection, vulnerability scanners, baseline management, backup and recovery, remote… more
- Lumen (Olympia, WA)
- …Threat Hunting and Research. Project tasks may include: + Explore emerging threats, malware behavior, and reverse engineering. + Learn to contribute to tool tuning, ... Notebooks, and SIEM tools. + Contribute to research on emerging threats, malware behavior, and reverse engineering. + Document findings and collaborate with… more
- Amazon (Seattle, WA)
- …of operating system security, network security, cryptography, software security, malware analysis, forensics, security operations, incident response, and emergent ... Response and proficiency in at least one of the following domains: Malware Analysis / Reverse Engineering; Digital Forensics; Security Tool Development & Automation;… more
- Amazon (Seattle, WA)
- …of operating system security, network security, cryptography, software security, malware analysis, forensics, security operations, incident response, and emergent ... response, security automation tooling, or threat intelligence. - Experience with malware analysis, forensics, SOAR, SIEM platforms, and a variety of Operating… more
- Microsoft Corporation (Redmond, WA)
- …experience in one or more areas: security operations, threat intelligence, malware analysis, vulnerability and posture management, anomaly detection, phishing and ... fraud detection, or cloud identity and access. + Experience with distributed training and scaling techniques, for example DeepSpeed, FSDP, ZeRO, model and pipeline parallelism, mixed precision, and profiling. + Experience with privacy preserving ML including… more
- Google (Kirkland, WA)
- …design and execute high-impact technical solutions that ensure Low Latency Anti- Malware Answers (Llama) and future open-weight social media platform AI offerings ... are seamlessly deployed, optimized, and consumed at scale on Google Cloud Platform (GCP), accelerating the value of the partnership.Google Cloud accelerates every organization's ability to digitally transform its business and industry. We deliver… more
- Google (Seattle, WA)
- …with teams across Google to deliver bold solutions in abuse areas such as malware , spam and account hijacking. A team of Analysts, Policy Specialists, Engineers, and ... Program Managers, we work to reduce risk and fight abuse across all of Google's products, protecting our users, advertisers, and publishers across the globe in over 40 languages. The US base salary range for this full-time position is $174,000-$258,000 + bonus… more
- Meta (Olympia, WA)
- …threats that aim to collect sensitive information or disrupt business. 3. Analyze malware and develop new signatures or methodologies to track activity and drive ... rapid deployment of countermeasures. 4. Assess the security of the core infrastructure and take a hands-on role in building solutions. 5. Make threat intelligence actionable by integrating it with existing or novel detection capabilities. 6. Define… more