Требуется человек для реверсинга и анализа малвари в Дубаи. Погода хорошая (кроме лета, но тогда все в кондиционерах), деньги неплохие, контракт на 2 года.
Все вопросы - в личку.
Компания большая, экип по incident response очень дружественный и не малый - рекоммендую (сам здесь работаю).
Если есть знакомые, желающие пожить в теплой стране с хорошей зарплатой - перешлите им эту вакансию, они будут вам благодарны.
Если Ваши знания и опыт нам подойдут, берем сразу.
Работа требует очень хорошего знания Англиского (писменно и разговорно)
> Minimum Requirements:
> • Minimum of 5 years experience in Reverse Engineering Malware and Malware Forensics.
> • at least one valid Malware Certification
> • Experience executing Malware Investigation on compromised environments and APT.
> • Skilled in technical and non-technical writing. Above average verbal and written communication skills.
> • Well developed analytical and problem solving skills.
> • Effective prioritization and time management skills.
> • Ability to shift focus to higher, breaking priorities without concern.
> • Understanding of common attacker methodologies and exploit techniques
> • Demonstrated track record of teamwork and collaboration.
>
> Desired Technical Skills:
> Experienced in using reverse engineering software packages (such as IDA Pro, IDA Python PyDbg, or OllyDbg, WinHex), both x86 and x64 binarie.
> Experienced in using network forensic tool (such as TCPDump/PCAP analysis, WireShark, Net-witness)
> Ability to reverse engineer binaries of various types including:
> C, C++, .NET, and Delphi
> Strong understanding of Windows Internals
> Comprehensive understanding of common Windows APIs
> Ability to analyze shellcode
> Understanding of software exploits
> Ability to analyze packed and obfuscated code
> scripting capabilities to automate analysis tasks
> Understanding of software engineering methodologies
> Experience developing applications in C, C++, and .NET
> Thorough understanding of network protocols
> Understanding of how to identify host and network indicators for detection
> Experience with UNIX/Linux and Microsoft Windows
>
> Additional Desired Skills:
> • Experience working on Symantec End Point Protection Platform, McAfee EPO, Mandiant Redline, Fireeye
> • Experience in Incident Response or Digital Forensics
> • Familiar with host forensics tools and techniques (such as EnCase, FTK, or Sleuth Kit/Autopsy )
> • Experience writing Malware detection signature for AV platforms, IPS, IDS
> • Minimum of 3 years experience in computer security related fields
>
> Essential Duties and Responsibilities
> • Perform malware analysis on various file formats including malicious documents and executables
> • Perform triage and in-depth analysis of malicious windows software (malware), phishing emails, and other client side exploits, to support the resolution of security incidents.
> • Perform digital forensics on media associated with compromised hosts to assess the scope and nature of malware infection.
> Identify and dissect highly targeted attacks and other suspicious activity using a variety of network based tools.
> Provide accurate and rapid reporting of in-depth technical analysis results in written form. Works independently and provides mentorship to junior technical staff as needed.
> Contribute to R&D efforts in the field of malware analysis and support the company’s research efforts.
> Mentor less experienced staff



Reply With Quote
Thanks
