- BlackRock (Wilmington, DE)
- …security solutions - IDS, Splunk, data loss prevention, next generation anti- malware , etc. + Intermediate knowledge of networking fundamentals (TCP/IP, Network ... Layers, etc.). + Intermediate knowledge of malware operation and indicators. + Intermediate knowledge of current...(IDS, IPS, FW, WAF, SIEM, DLP, Proxy, next gen anti- malware etc.). + Intermediate knowledge of Windows and Unix… more
- Cisco (San Jose, CA)
- …enterprise. You will lead architectural vision across SWG, DLP, CASB, and malware protection, while also driving innovations to secure sensitive data in the ... Gateway, Data Loss Prevention (DLP), Cloud Access Security Broker (CASB), and malware prevention. + **Technical Leadership:** Serve as the technical authority for… more
- CACI International (Annapolis Junction, MD)
- …Opportunity:** Join our dynamic team as a Reverse Engineer with a focus on malware exploitation (MEX) and mobile capabilities. This role offers a unique chance to ... cybersecurity landscape. If you are passionate about reverse engineering, malware analysis, and innovative problem-solving, this is the perfect opportunity… more
- AIG (Reston, VA)
- …and tools available + Conduct deep-dive investigations into threat actors, TTPs, malware , phishing campaigns, and IOCs using OSINT, dark web, commercial feeds, and ... groups + Strong knowledge of common threat actor tools, infrastructure, and malware families + Proven ability to translate complex information sets into specific… more
- Google (CO)
- …containment actions. + 5 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics. + Ability ... navigating technically high-profile incidents, performing forensic analysis, threat hunting, and malware triage.Part of Google Cloud, Mandiant is a recognized leader… more
- Lowe's (Mooresville, NC)
- …develop, and maintain custom offensive tooling, including loaders, droppers, malware implants, in-memory execution frameworks, and covert initial access payloads ... cloud identity attack primitives. + Prototype, test, and validate new malware techniques in isolated research environments; document behaviors, measure detection… more
- 3M (Austin, TX)
- …fine-tune detection rules and use cases. + Analyze the unknown: Perform malware triage, log correlation, and network traffic inspection to uncover hidden threats. ... investigations and responding to advanced cyber threats + Skilled in malware analysis, threat hunting, and forensic investigations across diverse environments +… more
- Foxhole Technology, Inc (Smyrna, GA)
- …and reduce potential legal and financial risks. + Continuously monitor malware detection software tools. + Monitor network-based security sensors for anomalies ... efforts with DoD and non-DoD organizations, including recommendations to improve malware protection strategies. + Provide quarterly Cybersecurity reports on the… more
- Providence (Irvine, CA)
- …as Structured Analytic Techniques + Ability to classify, categorize, and analyze malware and threats. Translate this into actionable detections using frameworks such ... of knowledge about the healthcare industry threat landscape, including threat actors, malware , hacking techniques, emerging threats, and trends that may impact the… more
- Citigroup (Irving, TX)
- …platforms and threat hunting frameworks. + Knowledge of common attack techniques, malware families, and threat actor tactics, techniques, and procedures (TTPs). + ... + Security certifications such as GIAC Certified Reverse Engineering Malware (GREM), Certified Information Systems Security Professional (CISSP), or GIAC… more
Recent Jobs
-
Developer Marketing Manager - Nsight Developer Tools
- NVIDIA (Santa Clara, CA)