Flag: Tornado! Hurricane!

 Forums >>  Job Openings  >>  Career: GE Aviation: Information Security Intel and Malware Analyst (Cincinnati, OH)

Topic created on: February 21, 2011 14:05 CST by aeppert .

GE Aviation: Information Security Intel and Malware Analyst (Cincinnati, OH)

The Information Security Intel and Malware Analyst is a technical and subject matter expert on the IA Operations team. In this role, you will serve as key IT liaison & process expert in information security; be responsible for malware analysis and reverse engineering, and the processing of intelligence information to develop signatures for detecting and responding to information security events.

Essential Responsibilities

Perform static and dynamic analysis of malware
Provide technical and collaborative threat expertise
Develop and tune indicators and signatures for use in incident detection and response
Develop tools/scripts that aid in reverse engineering and detection
Conduct protocol analysis of malware communications channels
Perform internal and external threat and incident reporting
Develop preventative measures to increase the security of the business environment based on detailed knowledge of the threat
Analyze and process classified and unclassified intelligence information for use in company systems and incident response
Utilization of IA Operations tools and GE Corporate tools, to include Enterprise Visibility Initiative (EVI) and Enterprise Sensor Grid (ESG)
Interface with fellow team members, colleagues on the GE security teams, business partners, management, vendors, and external parties such as law enforcement, military, and research organizations
Work with a globally distributed team and rely heavily on electronic communication
Must be able to work independently when necessary and be self-directed when appropriate
Work within the framework of established operating procedures to implement security measures for the business� information assets
Provide troubleshooting and maintenance on procedures and controls necessary to ensure and protect the safety and security of all information systems assets
Focus on the physical protection of information systems assets and corporate information and intellectual property assets in order to prevent the intentional or inadvertent access, modification, disclosure, or destruction of those assets
Assist others in the accomplishment to work assignments through technical leadership
Provide technical expertise and counsel to management, other organizations, and special projects personnel
Direct the preparation of and approve appropriate reports and communicate status and results
Make technical decisions by applying fundamental engineering principles and specialized knowledge or skills to assigned tasks
Establish the priority of work and assignment of personnel to meet objectives
Estimate costs and schedules, recommend resource required and solutions to problems, which arise during the course of a project
Serve as a primary interface with internal and external contributing organization relative to technical requirements, directions and problem resolution
Collaborate with management in developing technical directions, setting objectives, and setting realistic and challenging goals
Formulate plans to achieve overall goals, technical requirements, schedules, and contract commitments for assigned tasks
Implement work activities to meet these plans, monitor progress, and report status

Qualifications/Requirements

Bachelor�s degree in Information Systems, Information Technology (IT), Computer Science or Engineering from an accredited college or university (OR a high school diploma/GED with at least 4 years of information systems design, implementation, or integration)
Minimum of 4 years experience with cyber intelligence and incident response
Minimum of 4 years experience reverse engineering malicious binaries
Minimum of 2 years experience with network- and host-centric detection and response skills
Minimum of 2 years experience with coding

For a full job description (and to apply for this position): http://bit.ly/h0ZXze

No posts found under this topic.

There are 31,311 total registered users.


Recently Created Topics
[help] Unpacking VMP...
Mar/12
Reverse Engineering ...
Jul/06
hi!
Jul/01
let 'IDAPython' impo...
Sep/24
set 'IDAPython' as t...
Sep/24
GuessType return une...
Sep/20
About retrieving the...
Sep/07
How to find specific...
Aug/15
How to get data depe...
Jul/07
Identify RVA data in...
May/06


Recent Forum Posts
Finding the procedur...
rolEYder
Question about debbu...
rolEYder
Identify RVA data in...
sohlow
let 'IDAPython' impo...
sohlow
How to find specific...
hackgreti
Problem with ollydbg
sh3dow
How can I write olly...
sh3dow
New LoadMAP plugin v...
mefisto...
Intel pin in loaded ...
djnemo
OOP_RE tool available?
Bl4ckm4n


Recent Blog Entries
halsten
Mar/14
Breaking IonCUBE VM

oleavr
Oct/24
Anatomy of a code tracer

hasherezade
Sep/24
IAT Patcher - new tool for ...

oleavr
Aug/27
CryptoShark: code tracer ba...

oleavr
Jun/25
Build a debugger in 5 minutes

More ...


Recent Blog Comments
nieo on:
Mar/22
IAT Patcher - new tool for ...

djnemo on:
Nov/17
Kernel debugger vs user mod...

acel on:
Nov/14
Kernel debugger vs user mod...

pedram on:
Dec/21
frida.github.io: scriptable...

capadleman on:
Jun/19
Using NtCreateThreadEx for ...

More ...


Imagery
SoySauce Blueprint
Jun 6, 2008

[+] expand

View Gallery (11) / Submit