What are the responsibilities and job description for the Malware Analyst position at Nozomi Networks?
As we expand our product portfolio and global presence, our Security Research department is hiring a Malware Analyst to produce accurate threat intelligence and reverse-engineering samples to create solid detection signatures.
You could be the next "Nozomier"! If this sounds like you, read on.
In this role, you will:
- Create and tune various detection rules within our product
- Perform threat intelligence operations to collect and vet all the required knowledge to respond efficiently to advanced threats
- Occasionally contribute to the technical material shared with the public
- Embody the Nozomi Networks Cultural Pillars and our mission to protect what matters most with transparency and trust
To be successful in this opportunity, you should have:
- Experience in creating some of these signatures: YARA, SNORT or SURICATA, STIX, and SIGMA
- Familiarity with the MITRE ATT&CK framework and cyber kill chains
- Understanding of the OSI model and an ability to use Wireshark
- Basic experience with Python
- Attitude to operate in environments including data covered by non-disclosure agreements and high-level of confidentiality
These qualifications would be a strong plus:
- Proven experience in reverse engineering using analysis tools like IDA PRO, Ghidra, OllyDBG, x64dbg, radare2, etc
- Fundamental understanding of attributes of binary files such as executable structures and packers
- Previous professional experience as a Detection Engineer, SOC Analyst or a Threat Hunter.