drjobs Cyber Intelligence Vice President - Malware Analyst

Cyber Intelligence Vice President - Malware Analyst

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Plano, TX - USA

Monthly Salary drjobs

$ 152000 - 260000

Vacancy

1 Vacancy

Job Description

Description

Lead cybersecurity intelligence at a top firm safeguarding digital assets and enhancing threat detection and response capabilities. Harness your expertise to shape robust cybersecurity strategies and safeguard critical assets. Your leadership will be pivotal in enhancing our resilience against evolving global cyber threats.

As a Cybersecurity Intelligence Vice President in Cybersecurity & Tech Controls Malware Analysis team you will play a critical role in safeguarding the firms digital assets and infrastructure from cyber threats. Responsible for identifying assessing and mitigating risks you will inform and influence control measures across the organization. Your expertise in analyzing complex issues and developing innovative solutions along with your ability to collaborate with diverse teams will be crucial in enhancing the firms security posture. As a subject matter expert you will contribute to strategic cybersecurity initiatives and continuously improve our threat detection and response capabilities. Your work significantly impacts the firms operations fiscal management public image employee morale and client relationships.

Job responsibilities

  • Implement proactive threat intelligence strategies using advanced analytics and emerging technologies to identify and mitigate risks
  • Develop custom threathunting queries and rules for specific threat indicators in large data sets using data analysis tools or specialized languages
  • Enhance threat detection and response capabilities staying current with cybersecurity trends sharing insights and implementing best practices
  • Build and maintain strong relationships with stakeholders sharing threat intelligence and best practices to achieve operational goals and improve cybersecurity operations
  • Conduct malware analysis and reverse engineeringof suspicious code
  • Perform deep dive technical analysis of cyberattack tactics techniques and procedures (TTPs)
  • Develop signatures to identify malware families actor techniques and other noteworthy code sequences
  • Automate malware analysis and intelligence gathering processes
  • Hunt for novel samples indicators of compromise (IOCs) and actor TTPs in internal and external datasets
  • Research threats vulnerabilities and exploits to enhance monitoring and detection capabilities
  • Partner with the Incident Response (IR) teams to understand incidents and support technical analysis of malicious cyber events
  • Document and present findings in comprehensive technical analysis reports

Required qualifications capabilities and skills

  • 5 years of experience in cybersecurity focusing on threat intelligence analysis and mitigation
  • Expertise in advanced threat hunting security research and OpenSource Intelligence (OSINT) for risk identification and assessment
  • Proficiency in coding and scripting languages (C/C Python Bash JavaScript PowerShell) and experience with Security Information and Event Management (SIEM) tools (Splunk Elasticsearch) for automating threat detection and response
  • 5 years focusing on Malware Analysis and Reverse Engineering
  • An insatiable curiosity towards all things Cyber
  • Experience with debuggers disassemblers and other malware analysis tools (i.e. IDA Pro Ghidra Sandboxes x64dbg WinDbg)
  • Knowledge in Operating Systems (i.e. Windows Linux Mac Mobile) processor architectures (i.e. x86 x64 ARM ARM64 and computer networking
  • Strong written and verbal communication skills; ability to understand complex problems while formally presenting them simplistically
  • Ability to coordinate work with and gain the trust of business stakeholders technical resources and thirdparty vendors.

Preferred qualifications capabilities and skills

  • Prior background in Forensics Log Analysis Incident Response and / or Threat Intelligence
  • Experience in developing both tactical and strategic tools and capabilities
  • Expertise in advanced threat hunting security research and OpenSource Intelligence (OSINT) for risk identification and assessment



Required Experience:

Chief

Employment Type

Full-Time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.