Expoint - all jobs in one place

מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר

Limitless High-tech career opportunities - Expoint

Bank Of America Vice President Malware Analysis Cyber Threat Defense 
Australia, New South Wales, Sydney 
917850832

30.07.2024

Job Description:

The VP: Malware Analysis role undertakes incident response activities with a primary focus on Malware analysis.

What you will do

  • Perform both static and dynamic analysis of Malware to extract IoCs and identify Malware family.
  • Proactively respond to and disrupt actions by threat actors, mitigating potential threats.
  • Conduct in-depth analysis of various Malware alerts and associated events.
  • Reverse engineer the latest Malware and produce comprehensive deep-dive analysis reports.
  • Perform disk based and memory-based analysis of systems.
  • Execute and improve relevant risk management strategies.
  • Perform real-time analysis and trending of security log data from various security devices and systems.
  • Maintain data sources feeding the log monitoring system, develop and maintain detection and alerting rules.
  • Respond to user incident reports and evaluate the type and severity of security events.
  • Execute initial triage of incidents to rule out false positives.
  • Identify recurring security issues and risks and develop mitigation plans and recommend process improvements.
  • Interpret and apply security policies and procedures.
  • Establish escalation processes for security incidents and develop contingency plans and disaster recovery procedures.

Your background

  • Direct experience of analyzing Malware within Banking, Critical Infrastructure, Big Tech, or Vendors
  • Solid understanding of dynamic/static analysis of Malware.
  • Background in network traffic analysis related to Malware.
  • Experience in encryption/obfuscation and how to reverse engineer the same.
  • Experience of creating innovative ways to track progression of Malware families, infrastructure and campaigns conducted by various threat actors.
  • GCIH, GREM, GCFA, CISSP or CCSP desirable
  • Knowledge of networking protocols: TCP/IP, HTTP/HTTPs, FTP, etc.
  • Ability to create scripts and other forms of automation.
  • Excellent communication skills, able to adapt a message to various audiences.
  • Knowledge/experience of at least one major cloud services provider (AWS, GCP, Azure) technologies