What are the responsibilities and job description for the Exploitation Analyst (Multiple Levels) position at 8-BIT INT LLC?
About the Role:
The Exploitation Analyst plays a critical role in identifying, analyzing, and mitigating security vulnerabilities and threats within an organization's digital infrastructure. This position involves in-depth examination of malware and exploitation techniques to understand attack vectors and develop effective countermeasures. The analyst will collaborate with cybersecurity teams to enhance threat detection capabilities and support incident response efforts. By leveraging expertise in common internet protocols, the role ensures comprehensive analysis of network traffic and potential exploitation attempts. Ultimately, the Exploitation Analyst contributes to strengthening the organization's security posture by proactively addressing emerging threats and vulnerabilities.
Minimum Qualifications:
- Bachelor’s degree in Computer Science, Information Security, or a related field.
- Proven experience in vulnerability analysis and malware analysis.
- Strong understanding of common internet protocols such as TCP/IP, HTTP, DNS, and others.
- Familiarity with cybersecurity tools and techniques used for threat detection and analysis.
- Excellent analytical and problem-solving skills with attention to detail.
- Active TS/SCI clearance with an active Full Scope polygraph.
Preferred Qualifications:
- Professional certifications such as CEH, OSCP, GCIH, or equivalent.
- Experience with reverse engineering and sandboxing malware samples.
- Knowledge of scripting or programming languages such as Python, C, or Assembly.
- Experience working in a Security Operations Center (SOC) or incident response team.
- Familiarity with threat intelligence platforms and vulnerability management systems.
Responsibilities:
- Conduct detailed analysis of vulnerabilities and exploitation techniques to assess potential risks.
- Perform malware analysis to identify malicious behaviors and develop mitigation strategies.
- Monitor and analyze network traffic using knowledge of common internet protocols to detect suspicious activities.
- Collaborate with cybersecurity teams to support incident response and threat hunting operations.
- Develop and maintain documentation related to exploitation techniques, vulnerabilities, and mitigation measures.
- Stay current with emerging threats, vulnerabilities, and exploitation trends to inform security strategies.
- Provide technical expertise and recommendations to improve security controls and reduce attack surfaces.
Skills:
The required skills in vulnerability and malware analysis are applied daily to dissect and understand complex security threats, enabling the analyst to identify weaknesses before they can be exploited. Proficiency in common internet protocols allows the analyst to monitor and interpret network traffic effectively, distinguishing between normal and malicious activities. These skills support collaboration with incident response teams by providing actionable intelligence and technical insights during security events. Preferred skills such as scripting and reverse engineering enhance the analyst’s ability to automate tasks and deeply analyze malware behavior, increasing efficiency and accuracy. Together, these skills empower the analyst to contribute significantly to the organization's proactive defense and rapid response capabilities.
Salary : $81 - $172