Required Cybersecurity Architect-REMOTE-11+ YEARS

ROLE-CYBER SECURITY ARCHITECT
Location-REMOTE
EXP-11+ YEARS

 we are dedicated to pushing the boundaries of innovation and delivering exceptional
solutions to our clients. As a leader in our industry, we recognize the critical importance of
synergies between cybersecurity, infrastructure, data, applications, and cloud technologies in
today's digital landscape.
We are looking for a skilled and experienced Technical Cyber Incident Responder with expertise
in malware analysis and penetration testing to join our dynamic team. As a Malware Analyst and
Penetration Tester, you will play a critical role in detecting, analyzing, and mitigating advanced
cyber threats to ensure the security and resilience of our organization and clients' systems. You
will be responsible for coordinating responses to security breaches, conducting forensic
investigations, and implementing countermeasures to prevent future security incidents. This
role requires a deep understanding of cybersecurity principles, incident response procedures,
and the ability to work in a fast-paced environment.
Here's What You'll Do:
• Collaborate with other incident responders to analyze and respond to security incidents
involving malware infections and targeted attacks.
• Perform advanced malware analysis to identify, analyze, and reverse engineer malicious
code and malware behavior.
• Develop and maintain malware analysis tools, techniques, and procedures to enhance
detection and response capabilities.
• Conduct penetration testing and vulnerability assessments to identify and remediate
security vulnerabilities in systems and networks.
• Document findings, analysis, and remediation recommendations in detailed technical
reports for stakeholders and regulatory compliance.
• Stay updated with the latest cybersecurity threats, attack techniques, and malware
trends to proactively enhance defense measures.
Your Profile will include:
• Technical Skills:
o Proficiency in malware analysis tools and techniques, such as reverse
engineering, dynamic analysis, and static analysis.
o Experience in penetration testing methodologies, tools, and frameworks.
o Knowledge of network protocols, operating systems, and computer networks.

• Incident Response Experience:
o Hands-on experience in incident response, including detection, analysis,
containment, eradication, and recovery.
o Familiarity with incident response frameworks, such as NIST Cybersecurity
Framework or SANS Incident Response Process.

• Forensic Analysis:
o Ability to conduct forensic analysis on compromised systems and digital
evidence.
o Knowledge of forensic tools and techniques for data recovery, preservation, and
analysis.

• Communication and Collaboration:
o Strong communication skills to interact with stakeholders, including technical
teams, management, and external partners.
o Collaboration skills to work effectively in cross-functional teams during incident
response activities.
• Continuous Learning:
o Willingness to stay updated with the latest cybersecurity threats, trends, and
technologies.
o Participation in training programs, certifications, and industry conferences
related to incident response and cybersecurity.

• Process Management and Documentation
o Develop, maintain, and update documentation on incident response processes,
procedures and industry best practices.
o Create incident response playbooks for different types of security incidents.
Document lessons learned from incidents to improve incident response
capabilities.

Here's what you'll need:
• Bachelor's degree in computer science, information technology, cybersecurity, or related
field.
• 11+ years of experience in technical cybersecurity roles, with expertise in malware analysis,
reverse engineering, and penetration testing.
• Proficiency in cybersecurity tools and technologies such as malware analysis tools
(CrowdStrike Falcon, IBM-Resilient, EZ Tools), penetration testing frameworks (e.g.,
Metasploit, Burp Suite), and SIEM systems.
• Strong knowledge of malware analysis techniques, malware families, and attack vectors.
• Hands-on experience with penetration testing methodologies, tools, and techniques for web
applications, networks, and systems.
Certifications such as GIAC Certified Incident Handler (GCIH), Certified Malware Analyst
(CMA), Offensive Security Certified Professional (OSCP), or equivalent are highly desirable.

--
You received this message because you are subscribed to the Google Groups "Thivya Jothi" group.
To unsubscribe from this group and stop receiving emails from it, send an email to thivyajothi284+unsubscribe@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/thivyajothi284/CALXtW0vayafXXnC9LYuT27qBk%2BFP7ixM9ZtvQ5qZ7Wqza5nKbQ%40mail.gmail.com.

Comments

Popular Posts