- pony.ai (Fremont, CA)
- …+ Solid understanding of the threat landscape, attacker tactics (eg, phishing, malware , APTs, DoS attacks), and defensive strategies. + Proficiency in at least ... one scripting language (eg, Python preferred). + Skilled in security technologies such as SIEM, SOAR, EDR, ID/IPS, access control, vulnerability management, cloud security, and External Attack Surface Management (EASM). + Experience with cloud security… more
- BlackBox (Plano, TX)
- …Experience with endpoint security tools, ex: CrowdStrike Falcon, Cisco Umbrella, Cisco Anti- Malware protection + Microsoft email and Outlook on an Hybrid O365 ... Environment - OST/PST, Email Profiles, Shared Folders, Archives, Add-on's and Webmail + Networking - Exposure and knowledge of networking protocols and components - TcpIP, DHCP, DNS, Switches, Routers, Firewalls, VPN, Tokens, WiFi, Hotspots & Nic's. + Active… more
- Palo Alto Networks (Santa Clara, CA)
- …precision that drives great outcomes. **Your Career** We are seeking a security research engineer to join our pioneering security team. This role is for a technical ... and development abilities with a deep background in ML/AI as well as malware analysis. You will also spearhead the design and implementation of innovative security… more
- Innovative Management & Technology Services (Clarksburg, WV)
- …about defending critical systems from emerging cyber threats. As a Senior Reverse Engineer / Cyber Capability Developer, you'll play a pivotal role in securing ... work closely with ISSOs and development teams to evaluate applications, analyze malware , and drive secure coding standards across mission-critical systems. This role… more
- Cipher Tech Solutions (Vienna, VA)
- …Objective-C Regardless of whether you are applying to a software developer or reverse engineer position, if your application is approved, we will test you on both ... directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of...of analyzing malicious code. The goal of a reverse engineer is to understand how the malicious code works… more
- Battelle Energy Alliance dba Idaho National Laboratory (Idaho Falls, ID)
- …during this time. *Responsibilities Include:* * Analyze (reverse engineer ) anomalous/malicious software and hardware firmware/binaries. * Determine mitigation ... operations and analysis related to national security topics intrusion analysis, malware , systems and vulnerabilities, network security, advanced analytic tools, and… more
- Cipher Tech Solutions (Vienna, VA)
- …tools which directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and processing ... federal and military law enforcement, counterintelligence, and counter terrorist activities. Malware reverse engineering is the practice of analyzing malicious code.… more
- Cipher Tech Solutions (Tampa, FL)
- …tools which directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and processing ... federal and military law enforcement, counterintelligence, and counter terrorist activities. Malware reverse engineering is the practice of analyzing malicious code.… more
- Cipher Tech Solutions (Vienna, VA)
- …tools which directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and processing ... federal and military law enforcement, counterintelligence, and counter terrorist activities. Malware reverse engineering is the practice of analyzing malicious code.… more
- CACI International (St. Louis, MO)
- …Local * * * **The Opportunity:** Join our team as a CSOC Tier 3 Engineer and play a critical role in cybersecurity incident response. This position offers a unique ... IP blocks, domain blocks, and disabling user accounts. + Perform advanced malware and implant analysis, and forensic artifact handling and analysis. + Collaborate… more