SOC Malware Analyst Key Role: Responsible for performing advanced malware analysis and static reverse engineering.... Manage dangerous malware in controlled environments. Supports analysis and research on latest malware to provide actionable...
SOC Malware Forensics Analyst, Senior The Opportunity: We are seeking an experienced Malware Forensics Analyst... to join our Security Operations Center (SOC) team. This role requires analysis and collection of digital evidence to support investigations...
Forensics/Malware Analyst Washington, DC Pay From: $55.00 per hour MUST: Experienced Forensics/Malware Analyst.../malware analyst duties, including: Create duplicates of evidence that ensure the original evidence is not unintentionally...
cFocus Software seeks a Malware and Forensic Analyst (Senior) to join our program supporting US Courts in Washington... to perform required forensics/malware analyst duties, including: Create duplicates of evidence that ensure the original...
) Analyst- Tier 3. Under the general supervision of the Section Chief (SOC and Threat Intelligence), the SOC analyst -Tier 3... of the International Monetary Fund (IMF) is seeking to fill the contractual position of Security Operations Center (SOC...
center (SOC), incident response, malware analysis, or IDS and IPS analyses Understanding of scripting languages... GCFE - GIAC Certified Forensic Examiner GREM - GIAC Reverse Engineering Malware GNFA - GIAC Network Forensic Analyst...
Overview A Senior Cyber Intrusion Detection Analyst is needed to provide advanced incident response and monitoring... 11pm7am, and Tuesday 7am3pm). Responsibilities Respond to cyber incidents, including SOC incident response calls...
Overview GovCIO is currently hiring for Senior Cyber Intrusion Detection Analyst for 5th shift work (7am-7pm Saturday.... Responsibilities Respond to cyber incidents, including responding to SOC IR phone calls and SOC emails Act as a Subject Matter...
and SOC workflows. Develop and tune packet capture policies, filters, and monitoring rules to optimize visibility. Analyze... network traffic to identify Indicators of Compromise (IOCs), malware activity, and anomalous behaviors. Provide forensic...