Reverse Engineering - Malware Analyst

Location: Palo Alto, CA
Reverse Engineering - Malware Analyst
Location: Palo Alto, CA  (relocation available for this position)
Type: Full Time employee or contract
Our client is building an indent response team whose mandate is to detect, prevent and respond to threats to the company’s computer systems.  This is a new team that is fast paced, exciting and creative -- responsible for protecting a global enterprise.  The position is Palo Alto, offers flexible hours, casual dress and challenging work.  The team reports directly to the CISO of the company.
We are seeking an entry level information security specialist (recent college graduate) who has expertise and demonstrated interest in network security monitoring, reverse engineering, host forensics, and incident response.
The ideal candidates will have an open mind, bring a fresh perspective to a new incident response team and be passionate about protecting, defending and responding to computer related incidents.
The primary duty of the Malware Analyst is the analysis of malware and performing research and development of malware analysis tools. Results of the research and tool development will be directly feed into the incident response team’s tools and capabilities.
The Malware Analyst will be working with industry respected malware, network, and incident response analysts to coordinate a best in class response to computer related incidents. If you have worked in the information security related field and feel the need for technical and leadership growth this is the right position for you.
Required Skills:
  • Strong analytical, documentation, and communication skills.
  • Familiarity with Windows, Apple, and Linux based operating systems (e.g. XP, Windows 7, 2003, 2008, OS X).
  • 3+ years of experience in information security.
  • 1+ years of experience working on computer security incident response team.
  • Strong skills in malware analysis and exploit development for Windows, Mac OS X, Linux, Solaris, and FreeBSD.
  • Experience with tools such as IDA pro, OllyDbg, WinDBG, GDB, Visual Studio, and XCode.
  • Strong understand of Windows Internals.
  • Created Indicators of Compromise (IOCs) from malware analysis, easily implemented by incident responders.
  • Proficiency in automating malware analysis with custom tools.
Desired Skills:
  • Accredited degree in computer science or information technology or equivalent years of experience.
  • Experience with version control software (e.g. Git, SVN,CVS) a plus.
  • Use of malware analysis tools such as BinDiff, BinNavi and VERA a plus.
  • Knowledge of two or more of the following languages (Perl, Python, C, C++, C#, Objective C, Ruby, Lisp, Scheme, IA-32/IA-32e assembly, ARM, Power PC, MIPS, SPARC, Shell, SQL, HTML, CSS, XSLT, XML, Java, or EnScript).
Contact – Stephan Frost --  Addastaff Consulting or reply to our website  650-638-9633 x 305
this job portal is powered by CATS