Incident and Malware Analyst

Sorry, this job was removed at 7:55 p.m. (EST) on Friday, September 15, 2017
Find out who's hiring in Greater Boston Area.
See all Data + Analytics jobs in Greater Boston Area
Apply
By clicking Apply Now you agree to share your profile information with the hiring company.

Are you looking to advance your expertise in cybersecurity, using your skill at investigating malware and attacks to improve the protection and awareness of organizations that need it? We are a well-funded, early-stage endpoint protection company delivering the strongest, most accurate protection with a simplicity that gives us the lowest management overhead in the industry. We’ve developed a new approach, called Responsive Machine Learning to drive protection that uniquely block exploits, fileless, and file-based attacks.

We are looking for an Incident and Malware Analyst who knows how to very quickly identify, understand, and explain malware attacks and packages when we see them. This person will know how to follow the technical trail of malware in order to help our customers to better understand the threats we have stopped, and to help Barkly better describe the kinds of samples and test data that we deal with every day. Maybe you’ve been doing incident response, or acting as a first-level SOC analyst. You know how to dig into malware and attacks to see how they perform, and you’d like to help to advance the Barkly solution which is stopping attacks before they cause the harm that you are usually cleaning up. As a member of the Research team, you will bring malware expertise and insights on newly discovered malware to key stakeholders on the product, engineering, marketing, sales, and customer success.

Responsibilities:

  • Identify, profile and reverse engineer malware software with an eye towards their behaviors and the system changes they create
  • Apply your experience and research to highlighting common areas of concern in recent events and to provide clarity around the campaigns that are identified in public reporting
  • Work closely with Customer Success, Marketing and Product teams to leverage new discoveries, and create and publish findings
  • Assist in the identification and validation of new sources of current malware, always looking to improve the breadth and depth of Barkly’s awareness
  • Stay abreast on the latest threats, vectors and tools

This is your dream job if you:

  • Have passion for cybersecurity, identifying the roots of malicious attacks and protecting victims
  • Are intellectually curious about how things work and a willingness to learn
  • Are a good communicator with strong deductive reasoning and the ability to follow issues to a single conclusion in a constrained amount of time
  • Want to learn more about the application of new techniques like automation and machine learning as components of breakthrough levels of protection
  • Thrive in a fast-paced work environments with ambitious goals and tight deadlines

Technical Requirements:

  • 2-5 years of operational malware or threat research as a primary or secondary job function in a security vendor or Fortune 1000 company
  • Familiarity with malware analysis tools such as IDA Pro, OllyDgb, Yara, Cuckoo or sandboxing technologies
  • Knowledge of programming and scripting languages, in particular Python
  • Solid systems level understanding of Windows Operating System internals and how they are abused and subverted by malware and malicious actors
  • Fundamental understanding of attributes of binary files such as imports/exports and packers
  • Excellent ( really ) communication skills and the willingness and ability to explain complex technical topics to less technical or experienced colleagues

Bonus Points:

  • Any published research or package analysis in a security community setting
  • Experience in automating malware analysis tasks and testing
  • Exposure to threat intelligence services and content
  • Experience in analyzing and differentiating use of Windows kernel and user-space API’s
  • Familiarity with distinguishing characteristics of popular malware families, including their various naming conventions across various vendor platforms
Read Full Job Description
Apply Now
By clicking Apply Now you agree to share your profile information with the hiring company.

Location

53 State Street, Boston, MA 02109

Similar Jobs

Apply Now
By clicking Apply Now you agree to share your profile information with the hiring company.
Learn more about BarklyFind similar jobs