Jobs in Kuwait Cyber Security & Malware Analyst - SOS HR Solutions #Jobs_in_Kuwait

Jobs in Kuwait - career in Kuwait - vacancies in Kuwait-Cyber Security & Malware Analyst - SOS HR Solutions-Jobs in Kuwait - career in Kuwait - vacancies in Kuwait

A. Cyber Security Responsibilities:
• Understand basic concepts such as networking, applications, and operating system functionality and be able to collaborate with other analysts to investigate security events, contextualize them with available intelligence, and identify potential threats.
• Transform event information and raw data into compromise reporting, acting to identify and halt active intrusions. Understand the operational security controls needed to detect, remediate, and prevent compromises. Candidates will need to apply their forensics, log analysis, and malware triage skills to solve complex intrusion cases.
• Maintain a strong understanding of network protocols, security appliances, and the data that traverses both.
• Responsible for Functional knowledge of host based forensic artifacts in as many operating systems; Windows, Linux, Mac OS.
• Consolidate technical artifacts and indicators into meaningful scale, impact, and remediation guidance.
• Analyze creatively and dynamically an ever-changing threat landscape by connecting disparate events into overarching incidents that may represent a larger threat than each individual event does alone.
• Responsible for Foundational knowledge of vulnerabilities, exploitation, lateral movement, command and control traffic, attacker methodologies, application whitelisting bypasses and legitimate service abuse.
• Responsible for Intelligence gathering, and updating of Threat intelligence data pipeline.
• Handle Independent threat analysis.
• Contribute to threat alerts & advisories.
• Responsible for development of internal systems & tools
• Foundational knowledge of vulnerabilities, exploitation, lateral movement, command and control traffic, attacker methodologies, application whitelisting bypasses and legitimate service abuse.
B. Malware Responsibilities:
• Help develop innovative tools to aid other business lines and automate malware analysis and reverse engineering efforts.
• Deal effectively and efficiently with actual or suspected malware infections, for instance investigating, stopping and helping to resolve malware incidents.
• Develop new malicious code analysis and detection tools.
• Analyze executables and malicious files
• Develop novel solutions to challenges facing incident responders and malware
 Qualifications:
A. Cyber Security Qualifications:
• The ability to analyze event and systems logs, perform forensic analysis, analyze malware, and other incident response related data, as needed.
• Deep understanding of incident response best practices and processes
• Familiarity with intrusion detection systems (e.g., snort) and tools (e.g., tcpdump, Wireshark).
• Knowledge of attack vectors, threat tactics and attacker techniques.
• Familiarity with network architecture and security infrastructure placement.
• Understanding of Windows operating systems and command line tools.
• A solid foundation in networking fundamentals, with a deep understanding of TCP/IP and other core protocols.
• Knowledge of network-based services and client/server applications.
• Proficient in multiple compiled and scripting programming languages (Shell, Perl, Python, Java, C++, Mozilla Rust, JavaScript)
• Proficient in TCP/IP networking and security.
• Good knowledge of vulnerability analysis, information warfare, Botnet analysis and Botnet propagation techniques.
• In-depth understanding of TCP/IP, DHCP, DNS, IPSEC, RPC, SMB, SSI-I, SIP, SMTP,IMAP, IRC, HTTP/S, FastFlux, Nettlow, SNMP, syslog
• Basic understanding of Google Apps APIs (maps, charts)
• Good Knowledge of Log Analysis
• Good Knowledge in Apache Kafka, Mesos, Docker, Elastic search and Apache Storm
• Good Knowledge of Open Source Intelligence & information gathering.
Technical Writing.
B. Malware Qualifications:
• Strong programming skills
• Goog Knowledge of network protocols(Layer 7, HTTP,FTP,POP3,SMTP); Good Knowledge of java and Android SDK.
• Knowledge of windows internals(XP,7,8,10) and window server edition.
• Ability to analyze disassembly of x86 and x64 binaries
• Knowledgeable in the use of (IDA Pro disassembler, OllyDbg, User- and kernel-mode debuggers, Common binary file formats, Dynamic analysis tools and Network analysis tools)
• Ability to reverse engineer binaries of various types including (C/C++, Delphi, NET, Flash and Compiled VBScript)
Ability to analyze shellcode
• Understanding of software exploits
• Ability to analyze packed and obfuscated code
• Capable of Python scripting to automate analysis tasks
• Experience developing scripts to decode obfuscated data and network communications
• Experience developing applications in C, C++, and .NET
• Thorough understanding of network protocols
• Capable of identifying host- and network-based indicators
• Experience mitigating anti-reverse engineering techniques
• Strong foundation in algorithms
• Programming experience in (Windows Shell, Perl, Python, Ruby, Java, C++, C#, Rust, JavaScript, etc)
• Technical Writing

Job Details

Posted Date: 2018-12-09
Job Location: Al Kuwait, Kuwait
Job Role: Information Technology
Company Industry: Information Technology

Preferred Candidate

Career Level: Mid Career

Jobs in Kuwait - career in Kuwait - vacancies in Kuwait

To apply for this job click here
Jobs in Kuwait - career in Kuwait - vacancies in Kuwait-Cyber Security & Malware Analyst - SOS HR Solutions-Jobs in Kuwait - career in Kuwait - vacancies in Kuwait

Post a Comment

Post a Comment (0)

Previous Post Next Post