Listing Description
The ideal candidate will possess a background in Information Security and the intelligence process, ideally gained in a global corporation. He/she will apply analytical rigor to all work while remain open to non-traditional information or conclusions. The analyst will have excellent writing and presentation skills and be able to defend his/her analytical conclusions in logical and persuasive terms. The Analyst will be able to work independently to meet tight deadlines.An engaging personality supported by an inquisitive, analytical mind
Strong communication skills with a brisk writing style; able to build a compelling and effective narrative.
Ability to work in fast-paced environment, to triage and to work within a small, highly-technical group while providing explanations to non-technical people
Ability to work as part of a distributed virtual analysis team with limited supervision
5 + years’ experience in Information Security, gained in a hands-on technical or intelligence role
History of participation in industry or technology information sharing groups, formal or informal
Ability to dynamically analyze malicious code and related threats
Understanding of how operating systems work and the ways malware interacts with them
Understanding of common network traffic protocols and familiarity with common network traffic analysis techniques
Past exposure to a variety of malware families used by Espionage or Criminal campaigns, such as PlugX, Poison Ivy, Vawtrak, etc.
Proficiency with Threat Intelligence Platforms and analyst software tools e.g. ThreatConnect, BAE systems, i2 Analyst Notebook, Maltego
Listing Details
- Citizenship: Us Citizen
- Incentives: Both
- Education: No Requirements
- Travel: Travel 25
- Telework: Full Telecommute