Listing Description
FireEye Intelligence is seeking a Technical Cybercrime Analyst who will work closely with our technical collections and research teams to research and track the tactics, techniques, and procedures of financially-motivated actors. The successful candidate is a seasoned analyst capable of interpreting vast quantities of data from various sources and communicating those findings to both internal and external stakeholders. We encourage giving back to the community and strongly support sharing of expertise by authoring whitepapers and speaking at conferences.
Qualifications
Strong understanding of cyber crime threats and the cyber criminal ecosystem
Knowledge of banking malware and experience analyzing associated infrastructure
Understanding of the tools and tactics used to distribute malware
Experience analyzing malicious office files, pdf and jar files, reviewing automated sandbox reports, and reviewing network traffic captures
Comfortable with scripting languages (e.g. VB or Python)
Familiarity with Kibana, Elasticsearch, and/or Neo4j
Ability to write various signature types to detect malware based on various host and network-based detection mechanisms
Ability to communicate complex technical concepts to non-technical people
Preferred:
Possesses subject matter expertise on several different eCrime malware families, how they have been historically distributed and the maturation of those families over time
Practical experience as an intelligence analyst
History of participation in industry or technology information sharing groups, formal or informal
Understanding of monetization and fraud tactics used by cyber threat actors
Comfortable independently interacting with external audiences
2+ years experience working with malware or exploits, or engaged in either threat research or incident handling
Foreign language skills in Russian, Chinese, Arabic, Farsi, and/or other major European languagesIdentify, assess, and track tactics, techniques, and procedures of eCrime actors
Perform technical analysis on malicious or suspicious artifacts
Stay current on new malware families, new capabilities and public reporting on these issues
Create custom analytic products for internal and external stakeholders based on conclusions and judgments derived from large quantities of FireEye Intelligence data sources and independent research
Work independently and collaborate throughout the FireEye organization to develop and coordinate the production of intelligence
Listing Details
- Citizenship: Us Citizen
- Incentives: Both
- Education: No Requirements
- Travel: Travel 25
- Telework: Optional Telecommute