Average salary: Rs1,228,333 /yearly
More stats ...Job Description
Years of Experience - 1 to 6 years
NP- Immediate to 30 Days
JOB DESCRIPTION: - Malware Analyst
Location- Hyderabad, Pune and Bangalore
JD :
Here are the some of the key skills which we are looking for it:
Static and dynamic malware analysis...
...For Malware + RE:
Here are the some of the key skills which we are looking for it:
Static and dynamic malware analysis(aware of file structure like, PE, PDF, OLE, windows short cut files etc...)
someone who has hands on writing signatures for malware samples(at-...
...more of the following: Android reverse engineering (DEX, ARM), malware analysis, threat modeling, incident/emergency response.
Preferred... ...security flaws and vulnerabilities.
As an Android Malware Analyst, you'll be protecting users by investigating and solving malware...
Job Description : - Static and dynamic malware analysis(aware of file structure like, PE, PDF, OLE, windows short cut files etc...)- Someone who has hands on writing signatures for malware samples (at-least initial vector malware).- Aware of trending malware family campaign...
...You ll perform cutting edge research and analyze (through reverse engineering and other methods) files, TTPs, exploits, and malwares to understand how they operate and behave.
The research will mostly be based on binaries and sample files but may also be based on other types...
...reside.
Responsibilities
Zscaler is looking for a senior/staff engineer with strong experience in analysing and deconstructing the malware.
You will be part of the core security team that develops security features for zscaler cloud for a large customer base,...
...users connect or where their applications and workloads reside.
The Security Researcher Senior will report to the Director, Malware Labs . The Security Researcher will be primarily responsible for doing malware analysis, exploit analysis, developing signatures and...
...Malware/Threat Researcher
Madhapur, Hyderabad
Full-Time position
Job Description:
We are looking for a Threat Researcher to join our Threat Research team to identify cyber threats, dissect code, and reverse engineer malware. You will operate semi-autonomously...
...We are seeking an enthusiastic Security Researcher to join a growing organization that specializes in advanced malware analysis, exploit analysis, reverse engineering, and machine learning. Our global organization works in the areas of malware research, customer escalation...
Rs 2 - 5 lakhs p.a.
...McAfee, TrendMicro, Kaspersky, Sophos, QuickHeal / Seqrite) Hands-On Technical Certificate is preferred
Endpoint, Technical support, infra support
Designation: Technical Support Engineer - Endpoint Anti Malware
Vacancies: 10
Experience: 1.0 Year(s) - 5.0 Year(s)...
...Understands and able to interpret windows event logs
Has handled and responded to at least one incident in their career
Basic static malware analysis
Working with sandboxes and able to interpret the results
Able to escalate and respond to questions in a remote...
...focus on value-adding activities.
Strong knowledge of Information security Concepts (e.g. Operating System Security, CVSS score, Malware/Virus/Trojan, Cryptography, Vulnerability, Secure/Insecure ports and services etc.)
Must keep abreast of Cyber Security trends, attack...
Number of Openings 2 ECMS ID in sourcing stage 446259 Assignment Duration 6 months Total Yrs. of Experience 5 to 8 years Relevant Yrs. of experience 5 years Detailed JD (Roles and Responsibilities)
comprehensive knowledge of resilience and recovery strategies in complex organizations...
...Description
What success looks like in this role:
Security Analyst with 3+ years of relevant experience having in-depth knowledge... ...for all the headers)
Total Security Protection(Antivirus/Anti-Malware, Endpoint Detection & Response, Personal Firewall/ Host...
...and uncover network incidents & vulnerabilities.
Fix detected malware/threats/vulnerabilities to maintain a high-security standard.... ...Professional Expertise
Proven work experience as a Security Analyst or similar role.
Experience in information security or related...
...Cisco InfoSec is looking for a full-time Information Security Analyst for Cisco's global Computer Security Incident Response Team (CSIRT... ...the following qualifications:
Familiar with Windows exploits, malware and malicious code trends
Demonstrate good customer service,...
...Job Title : Cyber Operations Analyst
Location: Pune
About Barclays
Barclays is a British universal bank. We are diversified by... ...Network Analysis, and Traffic Patterns.
. Identify attacks and malware (Trojans, Ransomware, etc.) analysing event data generated from...
Job Title: IT Security Analyst (Malware Analysis & Network Security) Department: IT
Skills Required
Malware Analysis
Network Security Management
Troubleshooting Job Description: We are seeking an experienced IT Security Analyst with a focus on Malware Analysis, Network...
...The Level 3 (L3) SOC Analyst is a core resource on the Security Monitoring team (Blue Team) which operates within CGI s Global Security... ...Experience with mentoring more junior analysts.
Knowledge of malware analysis techniques is an asset.
Knowledge of reverse engineering...
...Security Analyst L2 Location: Mumbai
Job Responsibilities
Experience with SIEM tool like IBM Qradar, PaloAlto XDR
Experience with... ...relevant certifications
Familiar with basic understanding of Malware, TCP/UDP packets, security tools such IDS/IPS, web proxies, SIEM...
...customers, and our brands.
The role:
Information Security Analyst is responsible for the day-to-day monitoring of systems and... ...Python or Bash
Demonstrated ability to perform static and dynamic malware analysis
Demonstrated ability to analyze large data sets and...
...Title: Endpoint Security Analyst
Skills: Microsoft Defender Endpoint (MDE) EDR solution, Symantec, Sophos AV And EDR tools
Total... ...access, network exploitation and covering tracks.
Knowledge of malware analysis concepts and incident handling methodologies.
Desired...
...Operations Center
Role Overview:
Cyber Security Operations Analyst will play a significant role in our Cyber Security Operations... ...baselines; such as SIEM, NAC.
• Respond to Endpoint protection and malware detection tools alerts.
• Makes suggestions on tuning IDS...
...the highest levels of user safety.
As an Operations Enablement Analyst, you will be a key player in operational enablement of the... ...across Google to deliver bold solutions in abuse areas such as malware, spam and account hijacking. A diverse team of Analysts, Policy...
~ Triage security incidents identified by SOC analysts.
Remediation/troubleshooting of endpoint antivirus solution, firewall or proxy related incidents.
Remediation of user workstations due to malware, adware or unwanted applications.
Identify enhancement to rule...
...Hi All,
Hiring on SOC Analyst - Full Time/Permanent – Work from Home
Interested Applicants please share resumes to ****@*****.***... ...Routers, TCP, UDP, IP model, Security Solutions, log analysis, Malware
Interested Applicants please share resumes to Praveen@...
...experience. Experience in leading engineering teams
Skills
Sr. SOC Analyst :
Responsibilities
Provide supervision, leadership, and... ...necessary data to Threat Experts for Digital Forensics and Malware Analysis
Skills/Experience
Overall 6 to 10 years of...
...Defence is looking an Indian based Security Operations (SecOps) Analyst (L1) to support Rackspace's strategic customers.
This role is... ...Macie, AWS Config and AWS CloudTrail
.Experience of analysing malware and email headers, and has skills in network security, intrusion...
...team will be a added advantage.
~ Triage Specialist: Tier 1 analysts are mainly responsible for collecting raw data as well as... ...tier 1 and tier 2 analysts need to be reviewed at this tier.
Malware Analysts or Reverse Engineers
Forensics Specialists or Analysts...
...Work Location : Chennai Notice : Immediate (0-15 Days)
Job description for Security Analyst L2.
Good communication skills
Antivirus and Anti-Malware solutions: McAfee ePO (should have experience in managing the Centralized ePO server), Symantec Endpoint Security...