Malware Analyst Mid

ECS Tech IncWindsor Mill, MD
3dOnsite

About The Position

ECS is seeking a Malware Analyst Mid to work in Windsor Mill office. Position Responsibilities: · Daily duties typically include assisting the Security Operations Center (SOC) with investigations into potential malware to categorize determine behavior/intent, and extract IOCs through basic and advanced malware analysis techniques · Using the latest threat intelligence, conduct proactive research and analysis on malware samples deemed to be potential threats to the organization · For all analysis conducted, develop signatures and clearly communicate analysis and key findings in malware analysis reports · Maintain awareness of latest threats and coordinate with threat intelligence resources to augment analysis · Communicate effectively with different teams and data centers during an investigation

Requirements

  • 3-5 years of experience in malware analysis / reverse engineering; 7+ years in information security
  • Bachelor’s degree in Computer Science, Computer Engineering, or other relevant discipline (or 7+ years in malware analysis/reverse engineering, 10+ years in information security with no degree)
  • Ability to create and maintain malware lab environment and conduct analysis using advanced static and dynamic malware analysis techniques
  • x86 Intel assembly language
  • Debugging
  • Unpacking
  • Windows registry
  • Windows system calls
  • Wireshark
  • IOC extraction
  • Signature creation & detection engineering
  • Linux operating system
  • Ability to interpret, debug, and deobfuscate various high-level languages (e.g., PowerShell, C/C++, JavaScript, Visual Basic, PHP)

Responsibilities

  • Assisting the Security Operations Center (SOC) with investigations into potential malware to categorize determine behavior/intent, and extract IOCs through basic and advanced malware analysis techniques
  • Conduct proactive research and analysis on malware samples deemed to be potential threats to the organization
  • Develop signatures and clearly communicate analysis and key findings in malware analysis reports
  • Maintain awareness of latest threats and coordinate with threat intelligence resources to augment analysis
  • Communicate effectively with different teams and data centers during an investigation
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service