Malware/Cyber Threats Analyst

Job Responsibilities:

• Monitor, audit and maintain the Security Operation Center systems
• Monitor, track, and analyze networks/systems for potential security violations and be capable to respond to all such incidents
• Deep analysis of security events and malware reverse engineering
• Act as subject matter expert for information security events and or incidents
• Report security trends and or problems to management
• Participate in on-call rotation for security incidents
• Research emerging threats
• Participate in security root cause analysis and follow-up
• Research novel approaches to complex problems and deploy solutions to solve those problems
• Develop, maintain and run Security Operations reports and alerts
• Create executive dashboard mockups for vulnerability assessment, patch management and incident response
• Develop correlation rules, tuning policies, automation and application logic for Security Operations systems
• Assist in developing the Security Incident Response Team and appropriate policies, standards and plans
• Engineer technological and process improvements for Security Operations
• Automate common Security Operations tasks
• Develop and maintain a Threat Hunting program to discover the unknown


please contact us for this job from here by reffering Job Title


Minimum Requirements:

• 7+ years of Information Security experience in a hands-on Analyst/Engineer role
• Previous experience with creating, tuning and monitoring SIEM systems
including technologies such as: Splunk, QRadar, Nitro, etc.
• Hands-on experience with Next Generation Firewall Threat and Deep Packet Inspection Platforms
• Hands-on experience with anti-virus, intrusion detection systems, firewalls, Active Directory, web proxies, vulnerability scanning solutions and other security tools found in large enterprise network environments
• Experience with DDoS mitigation strategies and solutions
• Excellent written and verbal skills and the ability to present complex, technical information to both technical and non-technical audiences
• Extensive knowledge of Linux and Windows operation systems, TCP/IP, packet analysis tools (Wireshark, etc.), databases and web applications /servers
• Working knowledge of web application security standards (OWASP)
• Knowledge of generally accepted forensic practices and tools
• Previous experience with pen-testing / vulnerability scanning and remediation
• Knowledge of standard frameworks for incident handling e.g. NIST 800-61
• Strong interpersonal and communication skills
• Demonstrable success working within a diverse team environment
• Ability to participate in on-call rotations and work off hours as needed
• Scripting & automation abilities (JavaScript, Python, PowerShell, Bash)