Job Description
Malware Analyst (Contract Position)
Contract Length: Start ASAP for 4-6 months
Location: Fully Remote (Eligible to sit in Charlotte, Simi Valley, Addison, Chicago, Annandale, Denver, Jersey City, Jacksonville)
Shift Hours (Surge Support)
- Shift 1: 7:00 PM CST - 3:00 AM CST (Friday - Tuesday)
- Shift 2: 3:00 AM CST - 11:00 AM CST (Saturday - Wednesday)
- Shift 3: 11:00 AM CST - 7:00 PM CST (Saturday - Wednesday)
Each shift is 8 hours a day, 40 hours a week.
Key Responsibilities:
We are seeking a motivated Malware Analyst to join a dynamic team in a fast-paced environment. As a Malware Analyst, you will be integral to identifying, analyzing, and responding to cybersecurity incidents involving malware. You will work in one of three specialized teams focused on Email, Web, or Endpoint malware. Your role will involve end-to-end incident response—from initial detection through analysis and resolution—while staying ahead of emerging threats and ensuring the security of critical systems.
You will be part of a collaborative, results-driven team, and your proactive approach to tackling malware incidents will be crucial in maintaining high levels of cybersecurity.
Key Responsibilities Include:
- Analyze various malware samples from different sources (email, web, endpoint).
- Perform forensic analysis and memory analysis.
- Identify and mitigate risks associated with malware incidents.
- Respond to and resolve incidents using industry-standard tools and techniques.
- Stay up-to-date with industry trends and emerging malware threats.
- Collaborate with team members and other departments to ensure effective incident response.
Required Skills and Qualifications:
- 3+ years of experience in malware analysis, specifically for email, web, or endpoint malware.
- Strong background in dynamic/static analysis of malware.
- Experience with network traffic analysis.
- Familiarity with encryption/obfuscation techniques (experience reversing them is a plus, but not required).
- Experience using incident response tools such as FireEye, McAfee, or Splunk (familiarity with Tanium is a plus, but training will be provided).
- 3+ years of experience in digital forensics.
- Ability to write scripts to support analysis and automation.
- Knowledge of networking protocols such as TCP/IP, FTP, IRC, etc.
- Excellent communication skills, with the ability to adapt to different audiences.
- Ability to work independently as well as part of a team.
Additional Desired Certifications:
- GCIH, GREM, GCFA, or CISSP are beneficial, but not required.
Work Environment and Culture:
- This position will be fully remote but focused on core locations for team collaboration.
- A fast-paced environment with high expectations and a strong emphasis on initiative and proactive thinking.
- The role offers an opportunity to work with experienced professionals in a collaborative setting.
Holiday Coverage:
- While you'll be working remotely, please note that holiday schedules will be adjusted to ensure 24/7 coverage. Some of the key holidays for which adjustments may be required include US, Singapore, and Chester holidays.
Employment Type: Full-Time
Salary: $ 40,000.00 140,000.00 Per Year
Job Tags
Holiday work, Full time, Contract work, Immediate start, Shift work, Saturday,