More jobs:
Job Description & How to Apply Below
A dedication to continuous learning and skill development to meet evolving job demands.
Minimum 4 years of experience in both static and dynamic malware analysis for x86/x64 or ARM architecture.
Proficiency with reverse engineering and analysis tools, such as disassemblers, compilers, and debuggers (like IDA, Ghidra, WinDBG, Sys Internals, LLDB, GDB ).
Strong background in malware analysis and understanding its behavior consisting of advanced malware techniques, including but not limited to anti
-tampering, defense evasion, lateral movement, ransomware, persistence, information leak.
Understanding of OS internals of at least one of Windows/Linux.
Programming experience :
Assembly, C/C++ , Python.
Advantages
Proficient with creating detection rules using YARA or similar engines for production use
Understanding of existing AV/EDR internals and detection mechanisms
Automation skills for handling malware detection based workflows is a plus but not mandatory.
Position Requirements
10+ Years
work experience
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
Search for further Jobs Here:
×