The Latest in IT Security

Research Analyst – Malware

25
Oct
2012

Research Analyst – Malware

Posted: 23 October 2012
Company name: Sourcefire
Location: Columbia, MD
United States
Travel: none
Poster represents: employer
Terms of employment: Salaried employee
Hours: full time
Onsite: yes

Description:
Develop and maintain detection content for Snort, ClamAV, and Razorback detection engines. Analysis of exploit code, attack tools, malware samples, and other malicious content to support the creation of detection content and other detection mechanisms. Additional responsibilities include participating in the open source mailing lists for ClamAV, Snort and Razorback, helping users and other analysts with setup, installation, and usage of these open source tools.

Required skills:
. Basic understanding of general network protocols

. Understanding of Penetration Testing Procedures

. General understanding of prioritization of vulnerabilities

. Basic understanding of exploitation methods

. buffer overflows

. integer under/over flows

. script / command shell injection

. cross site scripting

. cross site request forgery

. Working knowledge of the configuration of systems, network devices, and network topologies

. General knowledge of programming/scripting languages, methods, and techniques (C/C++, perl, ruby, python, bash, javascript)

. Working knowledge of the following tools

. wireshark

. snort

. gcc

. gdb

. Ida

. windbg / olly / immunity debugger

. Working knowledge of PCRE and regular expressions

URL for more information:
http://careers.peopleclick.com/careerscp/client_sourcefire/external/jobDetails.do?functionName=getJobDetail&jobPostId=126&localeCode=en-us

Leave a reply


Categories

SATURDAY, DECEMBER 16, 2017

Featured

Archives

Latest Comments

Social Networks