Flag: Tornado! Hurricane!

 Forums >>  Job Openings  >>  Career: Senior Malware/Threat Research Analyst - Xpect SVC

Topic created on: January 14, 2010 11:27 CST by aeppert .

Job Position: Senior Malware/Threat Research Analyst
Company: Small security company, amazing growth potential, 10+ current openings, amazing hands on opportunities.
Location: Atlanta, Georgia

*****Relocation: Required. Company will reimburse for all relocation expenses.

Collaborating with the marketing and engineering teams, the Senior Research Analyst will typically need to design and construct analysis tools that automate the extraction of botnet intelligence and make it available to the company's other technologies and its knowledgebase as well as responding to ad-hoc requests for malware analysis driven by business and client needs to determine characteristics, functionality, and/or recommend countermeasures.

Responsibilities:
Independent threat analysis and data mining of new botnet instances
Research in to new methods for detecting and reporting botnet activities
Dissection of new botnet samples and the automation of sample processing
Investigation of new botnet command and control tactics and subsequent enumeration of botnet operators
Focused analysis of botnet outbreaks within enterprise and ISP networks
Contribution to research and commercial papers describing the evolving botnet threat

Skills & Experience:
Experience as a security engineer, threat intelligence analyst, or similar senior technical role
Extensive knowledge of tracing and debugging Windows processes in the context of malware reverse engineering
Proficiency with C/C++ programming and x86 assembly /disassembly
Deep understanding of network flow data analysis, deep packet inspection and network behaviors of malicious software
Comprehensive knowledge of anti-debugging and anti-instrumentation techniques
Familiarity with packing and anti-reverse engineering techniques, including data obfuscations that employ primitive or basic cryptography
Ability to troll underground Internet forums and criminal sites/portals for new botnet intelligence

Rian Freedman
Xpect SVC, LLC
404-522-8889 | LOCAL
888-973-2887 | TOLL
404-520-8081 | CELL
404-393-0862 | FAX
rfreedman@xpectsvc.com
www.xpectsvc.com

No posts found under this topic.

There are 31,039 total registered users.


Recently Created Topics
Ultimate Hacking Cha...
Jun/21
CreateMutex
May/31
let 'IDAPython' impo...
Sep/24
set 'IDAPython' as t...
Sep/24
GuessType return une...
Sep/20
About retrieving the...
Sep/07
How to find specific...
Aug/15
How to get data depe...
Jul/07
Identify RVA data in...
May/06
Immunity Debugger Re...
Aug/03


Recent Forum Posts
How to find specific...
hackgreti
Problem with ollydbg
sh3dow
How can I write olly...
sh3dow
New LoadMAP plugin v...
mefisto...
Intel pin in loaded ...
djnemo
OOP_RE tool available?
Bl4ckm4n
OOP_RE tool available?
van7hu
Should binaries be n...
Kolisar
Problem with ollydbg
nullx42
!findtrampoline Immu...
skycrack


Recent Blog Entries
crystalwade
Jul/20
test

nieo
Mar/22
Android Application Reversing

halsten
Mar/14
Breaking IonCUBE VM

oleavr
Oct/24
Anatomy of a code tracer

hasherezade
Sep/24
IAT Patcher - new tool for ...

More ...


Recent Blog Comments
nieo on:
Mar/22
IAT Patcher - new tool for ...

djnemo on:
Nov/17
Kernel debugger vs user mod...

acel on:
Nov/14
Kernel debugger vs user mod...

pedram on:
Dec/21
frida.github.io: scriptable...

capadleman on:
Jun/19
Using NtCreateThreadEx for ...

More ...


Imagery
SoySauce Blueprint
Jun 6, 2008

[+] expand

View Gallery (11) / Submit