Threat Analyst III

Armor Defense
Full time
Software Development
United States
Hiring from: Anywhere

Title: Threat Analyst III



  • Location: United States, Remote


The best places to work are filled with employees who are excited about their careers and feel empowered to push the limits of their potential. That’s what being an Armor Hero is all about!


At Armor, innovation is realized each day. Every employee feels our passion, knows the vision and lives the company values. Everyone on the team regardless of their professional background, department or position learns right away that their role is important to Armor’s success. The ability to scale, innovate, design and deliver are made possible by our values.


Why work here? Well just to start we offer a collaborative environment with whiteboard walls everywhere, open seating, snacks, drinks, awesome benefits, and awesome people! Oh, and yea, we still have scooters from the dot com boom, we bought them on clearance.


Threat Analyst III


Summary:


Armor Defense, Inc., the leader in Managed Security Services is looking for a talented and highly motivated member to join our Threat Resistance Unit. As part of Armor’s Threat Resistance Unit (TRU) this position will have oversight and responsibility over assigned threat research projects, threat hunting engagements, and threat reversing, modeling, and analysis.


This will be a remote position for the ideal candidate.


Threat Analyst III Essential Duties and Responsibilities: (Additional duties may be assigned as required)



  • Conduct cyber threat intelligence research to collect priority intelligence requirements to protect against and detect threat activity on the corporate and customer environments.

  • Conduct targeted threat hunting and analysis in the context of intelligence gathered.

  • Detonate, reverse-engineer, and analyze malware samples as required for research.

  • Conduct Friendly Network Forces (FNF) activities to include penetration testing, targeted vulnerability assessments, and targeted threat hunting.

  • Create strong narratives and analysis for publication.

  • Develop and coordinate hypothesis-driven analytics and apply creative approaches to identify malicious activity.

  • Serve as a mentor to other Threat Analysts and support them in their work.

  • Serve as threat intelligence subject-matter expert.


Required Skills:



  • Strong knowledge and previous research in current security threats, malware, trends, and mitigations.

  • Experience with performing intermediate static and dynamic malware analysis and with setting up and leveraging automated malware analysis platforms.

  • Strong knowledge of host compromise and malware injection techniques.

  • Highly self-motivated and directed, with keen attention to detail.

  • Advanced public speaking skills to present to technical and non-technical stakeholders.

  • Excellent communication (oral and written), interpersonal, organizational, and presentation skills.

  • Ability to work evenings/weekends as necessary and ability to be on-call 24×7 in certain cases.


Education And/Or Experience:



  • Security and Technical Certifications: GCTI, GREM, OSCP, OSCE.

  • Bachelor’s Degree (preferred) and/or 6+ years of job-related experience.

  • Threat Intelligence, malware research Courses.


Technical Qualifications:


To perform this job successfully, an individual must be able to perform each essential duty satisfactorily.


The requirements listed below are representative of the tools, systems and knowledge requirements in our environment today, but this list will change and grow:



  • Have a strong, in-depth knowledge of PE structures, Windows malware, and Linux malware.

  • Knowledge of and ability to administer Windows and Linux Server environments.

  • Knowledge of and ability to administer network and host-based security tools to include penetration testing and ethical hacking products.

  • Knowledge of and ability to administer scripting languages: Python, Go, PHP, Perl, Bash, Ruby.

  • Knowledge of and ability to use cloud infrastructure and provisioning technology


Work Environment:


The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. The noise level in the work environment is usually low to moderate. The work environment may be in either an office setting, at the company’s data center, or at a third-party location for training.


How to apply

To apply for this job you need to authorize on our website. If you don't have an account yet, please register.

Post a resume

Similar jobs

SovTech
Contract
SovTech's is looking for a PHP Developer to join their team on a contract basis.   PHP Developer responsibilities are: Developing custom modules for Prestashop Keeping Prestashop up to date to the latest version Optimising server speed with caching and other...
Software Development
United States
Hiring from: Anywhere
BoxKnight
Full time
About BoxKnight: BoxKnight is a same and next day delivery service. We work with e-commerce retailers to offer their customers fast and personalized deliveries, allowing them to compete with Amazon Prime. We use the local inventory in warehouses or storefronts...
Software Development
United States
Hiring from: Anywhere
About this job Location options: RemoteJob type: Full-timeExperience level: Mid-Level, Senior, LeadRole: Mobile DeveloperIndustry: Internet of Things, IT Security, SecurityCompany size: 11–50 peopleCompany type: PrivateTechnologies ios, android, web, nodes, security Job description Update January 2021: You know what would put...
ios android web nodes security
Software Development
United States
Hiring from: United States