Threat Analyst III
Armor DefenseFull time
Title: Threat Analyst III
- Location: United States, Remote
The best places to work are filled with employees who are excited about their careers and feel empowered to push the limits of their potential. That’s what being an Armor Hero is all about!
At Armor, innovation is realized each day. Every employee feels our passion, knows the vision and lives the company values. Everyone on the team regardless of their professional background, department or position learns right away that their role is important to Armor’s success. The ability to scale, innovate, design and deliver are made possible by our values.
Why work here? Well just to start we offer a collaborative environment with whiteboard walls everywhere, open seating, snacks, drinks, awesome benefits, and awesome people! Oh, and yea, we still have scooters from the dot com boom, we bought them on clearance.
Threat Analyst III
Armor Defense, Inc., the leader in Managed Security Services is looking for a talented and highly motivated member to join our Threat Resistance Unit. As part of Armor’s Threat Resistance Unit (TRU) this position will have oversight and responsibility over assigned threat research projects, threat hunting engagements, and threat reversing, modeling, and analysis.
This will be a remote position for the ideal candidate.
Threat Analyst III Essential Duties and Responsibilities: (Additional duties may be assigned as required)
- Conduct cyber threat intelligence research to collect priority intelligence requirements to protect against and detect threat activity on the corporate and customer environments.
- Conduct targeted threat hunting and analysis in the context of intelligence gathered.
- Detonate, reverse-engineer, and analyze malware samples as required for research.
- Conduct Friendly Network Forces (FNF) activities to include penetration testing, targeted vulnerability assessments, and targeted threat hunting.
- Create strong narratives and analysis for publication.
- Develop and coordinate hypothesis-driven analytics and apply creative approaches to identify malicious activity.
- Serve as a mentor to other Threat Analysts and support them in their work.
- Serve as threat intelligence subject-matter expert.
- Strong knowledge and previous research in current security threats, malware, trends, and mitigations.
- Experience with performing intermediate static and dynamic malware analysis and with setting up and leveraging automated malware analysis platforms.
- Strong knowledge of host compromise and malware injection techniques.
- Highly self-motivated and directed, with keen attention to detail.
- Advanced public speaking skills to present to technical and non-technical stakeholders.
- Excellent communication (oral and written), interpersonal, organizational, and presentation skills.
- Ability to work evenings/weekends as necessary and ability to be on-call 24×7 in certain cases.
Education And/Or Experience:
- Security and Technical Certifications: GCTI, GREM, OSCP, OSCE.
- Bachelor’s Degree (preferred) and/or 6+ years of job-related experience.
- Threat Intelligence, malware research Courses.
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily.
The requirements listed below are representative of the tools, systems and knowledge requirements in our environment today, but this list will change and grow:
- Have a strong, in-depth knowledge of PE structures, Windows malware, and Linux malware.
- Knowledge of and ability to administer Windows and Linux Server environments.
- Knowledge of and ability to administer network and host-based security tools to include penetration testing and ethical hacking products.
- Knowledge of and ability to administer scripting languages: Python, Go, PHP, Perl, Bash, Ruby.
- Knowledge of and ability to use cloud infrastructure and provisioning technology
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. The noise level in the work environment is usually low to moderate. The work environment may be in either an office setting, at the company’s data center, or at a third-party location for training.