Join Fortinet a cybersecurity pioneer with over two decades of excellence as we continue to shape the future of cybersecurity and redefine the intersection of networking and security. At Fortinet our mission is to safeguard people devices and data everywhere. We are currently seeking a dynamicTactical Threat Analystto contribute to the success of our rapidly growing business.
This role requires this individual to work in US EST Sunday - US EST Thursday (12pm EST 9pm EST) / Local time (1am 10am).
As a Tactical Threat Analyst you will:
Review incoming security events to perform initial triage of events primary from our FortiEDR technology.
Identify and analyze events that appear highly suspicious and notifying customs of malware infections.
Conduct host-based analysis and forensic functions on Windows Linux and Mac OS X systems.
Work on escalated events and help to assist other team members.
Assist in enhancing and tuning Fortinets Cloud Services and Automated Incident Response (AIR) system.
Review firewall web database and other log sources to identify evidence and artifacts of malicious and compromised activity.
Leverage on our FortiEDR platform to conduct investigations to rapidly detect analyze and contain security threats.
Perform memory forensics and file analysis as needed.
Monitor FortiGuard Labs data and open-source intelligence outlets to maintain proficiency in latest threat actor tactics and techniques.
Preform reverse engineering of threat actors malicious tools.
We Are Looking For:
Experience with of at least one scripting language: Shell Ruby Perl Python etc.
Strong knowledge of operating system internals endpoint security experience an active directory a must.
Experienced with EnCase FTK X-Ways SIFT Splunk Redline Volatility WireShark TCPDump and open-source forensic tools a plus.
Demonstrate relevant experience as a contributing member of a security operations threat intelligence or incident response team.
Experience with malware analysis tools such as IDA Pro OllyDbg Immunity Debugger a plus.
Hands-on experience dealing with APT campaigns attack Tactics Techniques and Procedures (TTPs) memory injection techniques static and dynamic malware analysis and malware persistence mechanism.
Hands-on experience with memory forensics.
Excellent written and verbal communication skills a must.
Reading and writing skills of non-English languages such as Chinese and Russian a plus.
Analysis of Linux and MAC binary files and the understanding of MAC internals is a plus but not required.
Highly motivated self-driven and able to work both independently and within a team.
Able to work under pressure in time critical situations and occasional nights and weekends.
Bachelors Degree in Computer Engineering Computer Science or related field.
5 to 8 years experience with incident response and or Forensics.
GCFA GCIH GCFE GREM or any other related GIAC certification a plus.
Why Join Us:
At Fortinet we embrace diversity and inclusivity. We encourage applications from diverse backgrounds and identities. Explore our welcoming work environment designed for a rewarding career journey with an attractive Total Rewards package to support you with your overall health and financial well-being. Join us in bringing solutions that make a meaningful and lasting impact to our 660000 customers around the globe.
We will only notify shortlisted candidates.
Fortinet will not entertain any unsolicited resumes please refrain from sending them to any Fortinet employees or Fortinet email aliases. Should any Agency submit any resumes to Fortinet these resumes if considered will be assumed to have been given by the Agency free of any related fees/charges.
#LI-JT
Required Experience:
IC
From the start, the Fortinet vision has been to deliver broad, truly integrated, high-performance security across the IT infrastructure. We provide top-rated network and content security, as well as secure access products that share intelligence and work together to form a cooperativ ... View more