- Lowe's (Mooresville, NC)
- …and provides coaching and direction to more junior-level associates. As a Senior Analyst of Offensive Security, you will conduct advanced penetration tests and red ... develop, and maintain custom offensive tooling, including loaders, droppers, malware implants, in-memory execution frameworks, and covert initial access payloads… more
- Oracle (Seattle, WA)
- …+ SANS GIAC Certified Intrusion Analyst (GCIA) + SANS GIAC Reverse Engineering Malware (GREM) + Certified Information Systems Security Professional (CISSP) ... * Perform hands-on activities including network and log analysis, malware analysis and threat hunting. * Assist with the...years of experience as a Incident Response or DFIR Analyst . * 2+ years of Python scripting experience preferred… more
- CACI International (Chantilly, VA)
- …cyber domain technical and operational mastery. In this role, you will perform malware analysis and reverse engineering in support of incident response, ... Digital Network Exploitation Analyst Job Category: Engineering Time Type: Full time...penetration** **testing of the client's** **global network** **You will reverse engineer network layouts using data collected from the… more
- Huntington National Bank (Farmers Branch, TX)
- …monitoring and response from the Cybersecurity Operations Center. + Perform malware analysis, reverse engineering, and de-obfuscation techniques + Evaluate, ... basis. HYBRID ROLE 4 days in office Summary: The Cybersecurity Operations Analyst reviews security events to identify and prioritize potential threats and identify… more
- Nuclear Fuel Services (Lynchburg, VA)
- …XDR) + Vulnerability assessment tools for identifying and prioritizing vulnerabilities + Malware analysis and reverse engineering techniques + Proven ability to ... Overview: BWXT is currently seeking a Senior Cyber Security Analyst specializing in SOC tier 3 and red team...to Day as a Senior Cyber Security Operations Center Analyst : + Conduct thorough security assessments, red team exercises,… more
- ADM (Erlanger, KY)
- **101495BR** **Job Title:** Sr Threat Intelligence Analyst - Erlanger, KY **Department/Function:** Information Technology **Job Description:** **Sr Threat ... Intelligence Analyst - Erlanger, KY** **Position Summary** SCTIAs, under general...actor tools and techniques, motivations of threat actors, and malware , etc. The SCTIA will need to use intelligence… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely enable us to ... Cyber Electronic Warfare and Space team is currently seeking a Cyberspace Defensive Analyst in support of an exciting new effort supporting one of our clients… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely enable us to ... a dynamic threat landscape. We are seeking a Cyberspace Analyst to support a new initiative with one of...and support on cyber-related incidents and issues to include Malware Analysis Reports, Alerts regarding potential malicious activity, and… more
- Tyto Athene (Ashburn, VA)
- …GCFE - GIAC Certified Forensic Examiner + GREM - GIAC Reverse Engineering Malware + GNFA - GIAC Network Forensic Analyst **Location:** + Ashburn, VA ... of experience as a Tier III Cyber Threat Hunt Analyst conducting advanced threat hunting and forensic analysis. +...and network forensics + Intrusion detection and analysis + Malware identification and reverse engineering fundamentals +… more
- Citizens (Johnston, RI)
- …one or more scripting language (Bash, Python, Perl, PowerShell, etc.) + Experience with malware reverse Analysting and tools such as IDA Pro, OllyDbg, PEID etc. ... Description The Principal Incident Response Analyst will be a resident technical expert within...will also help mature an existing CSIRT incident response, malware analysis, and advanced threat detection programs. The individual… more