Decode, determine intent and categorize suspicious and malicious code.
Create and deploy code snippets to catch suspicious files.
Deploy signatures in a timely, coordinated manner.
Research sources of infections to identify additional indicators of compromise.
Clean sites infections of SEO spam.
Submit new malicious sites and code to the signature queue.
Escalate Marking issues to Sr agents.
Marking BINSIG/Front End Queue FP.
Monitor Research Chat Teams Channel.
Work and respond to CRM tickets and Teams Chats submitted to the Research team.
Research sources of infections to identify additional indicators of compromise.
Stay abreast of the latest web, WordPress, and general security-related developments.
Other duties as assigned and related to the nature of this role and company initiatives.
Requirements:
Education:
A bachelor s degree or relevant years of working experience in related fields is required. An advanced degree in related fields is strongly preferred.
Relevant certifications (e.g. CySA+, Security+, or equivalent) are strongly preferred.
Experience:
Minimum 4+ years of experience and/or training pertaining to Internet security, or equivalent combination of education and experience is strongly preferred.
Minimum 1+ year of experience with Python, Perl, ASP, .NET, C, or other programming languages is required.
Minimum 1+ year of experience with the Linux command line.
Prior Malware analysis experience is strongly preferred.
Talents and Desired Qualifications:
Demonstrated understanding of regular expressions (PCRE).
Demonstrated understanding of programming and server-side scripting.
Demonstrated proficiency in PHP and JavaScript.
Ability to work without supervision, and to make appropriate decisions.
Ability to process work with accuracy and attention to detail.
Ability to maintain confidential information.
Ability to work well in a team environment, with both local and remote coworkers.