Research Analyst – Malware
23 October 2012 | |
Sourcefire | |
Columbia, MD | |
United States | |
none | |
employer | |
Salaried employee | |
full time | |
yes | |
Develop and maintain detection content for Snort, ClamAV, and Razorback detection engines. Analysis of exploit code, attack tools, malware samples, and other malicious content to support the creation of detection content and other detection mechanisms. Additional responsibilities include participating in the open source mailing lists for ClamAV, Snort and Razorback, helping users and other analysts with setup, installation, and usage of these open source tools. |
|
. Basic understanding of general network protocols . Understanding of Penetration Testing Procedures . General understanding of prioritization of vulnerabilities . Basic understanding of exploitation methods . buffer overflows . integer under/over flows . script / command shell injection . cross site scripting . cross site request forgery . Working knowledge of the configuration of systems, network devices, and network topologies . General knowledge of programming/scripting languages, methods, and techniques (C/C++, perl, ruby, python, bash, javascript) . Working knowledge of the following tools . wireshark . snort . gcc . gdb . Ida . windbg / olly / immunity debugger . Working knowledge of PCRE and regular expressions |
|
http://careers.peopleclick.com/careerscp/client_sourcefire/external/jobDetails.do?functionName=getJobDetail&jobPostId=126&localeCode=en-us |
Leave a reply