- Amazon (Arlington, VA)
- …provide reversing requirements as well as be able to independently triage malware , analyze exploit samples, and study attack techniques to understand how ... and the creation of corresponding detections and/or countermeasures - Experience with malware analysis, network flow analysis, and large scale data analysis -… more
- Cipher Tech Solutions (Vienna, VA)
- …tools which directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and processing ... federal and military law enforcement, counterintelligence, and counter terrorist activities. Malware reverse engineering is the practice of analyzing malicious code.… more
- Cipher Tech Solutions (Vienna, VA)
- …tools which directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and processing ... federal and military law enforcement, counterintelligence, and counter terrorist activities. Malware reverse engineering is the practice of analyzing malicious code.… more
- The County of Los Angeles (Los Angeles, CA)
- …of experience do you have with incident response activities (eg, phishing, malware , data breaches, account compromise). Notes: + Participating is defined as being ... possess experience usingand/orimplementing as part of your job? + CrowdStrike Anti- Malware + Microsoft Exchange Online Protection + Tenable Vulnerability Management… more
- Leidos (Reston, VA)
- …analysis, reversing engineering threats to determine methods of exploitation, malware research, researching innovative tools and techniques, and manipulating code ... evaluations, web application vulnerability assessment penetration testing and fuzzing, malware research and vulnerability mitigation * Excellent written and verbal… more
- CACI International (Springfield, VA)
- …and recovery measures for events and incidents. CSOC Tier 2 services includes malware and implant analysis, and forensic artifact handling and analysis. When a CIRT ... and other Contract Services; * Provides adversary attribution; * Performs malware analysis and signature development; * Provides input to and coordinates… more
- Cipher Tech Solutions (Bethesda, MD)
- …tools which directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and processing ... federal and military law enforcement, counterintelligence, and counter terrorist activities. Malware reverse engineering is the practice of analyzing malicious code.… more
- Robert Half Technology (Fort Lauderdale, FL)
- …and security dashboards for potential threats + Investigate suspicious behavior, malware activity, and endpoint security incidents + Perform vulnerability scans and ... tools (Qualys, Nessus, Rapid7) + Knowledge of common attack vectors, malware behavior, and incident response processes + Familiarity with networking fundamentals… more
- Oracle (Seattle, WA)
- …**Key Responsibilities** * Perform hands-on activities including network and log analysis, malware analysis and threat hunting. * Assist with the development of ... SANS GIAC Certified Intrusion Analyst (GCIA) + SANS GIAC Reverse Engineering Malware (GREM) + Certified Information Systems Security Professional (CISSP) + Offensive… more
- Google (WA)
- …actions. + 5 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics. **Preferred ... complex and high-profile incidents, performing forensic analysis, threat hunting, and malware triage. Part of Google Cloud, Mandiant is a recognized leader… more
Recent Jobs
-
Building Engineer- 3rd shift
- CBRE (Redmond, WA)
-
Lead Warehouse Associate
- WESCO (Suwanee, GA)
-
Survey Technician/Instrument Operator
- Surveying And Mapping, LLC (Tampa, FL)
-
Construction Manager
- Stantec (Salt Lake City, UT)