The Latest in IT Security

Research Analyst – Malware


Research Analyst – Malware

Posted: 23 October 2012
Company name: Sourcefire
Location: Columbia, MD
United States
Travel: none
Poster represents: employer
Terms of employment: Salaried employee
Hours: full time
Onsite: yes

Develop and maintain detection content for Snort, ClamAV, and Razorback detection engines. Analysis of exploit code, attack tools, malware samples, and other malicious content to support the creation of detection content and other detection mechanisms. Additional responsibilities include participating in the open source mailing lists for ClamAV, Snort and Razorback, helping users and other analysts with setup, installation, and usage of these open source tools.

Required skills:
. Basic understanding of general network protocols

. Understanding of Penetration Testing Procedures

. General understanding of prioritization of vulnerabilities

. Basic understanding of exploitation methods

. buffer overflows

. integer under/over flows

. script / command shell injection

. cross site scripting

. cross site request forgery

. Working knowledge of the configuration of systems, network devices, and network topologies

. General knowledge of programming/scripting languages, methods, and techniques (C/C++, perl, ruby, python, bash, javascript)

. Working knowledge of the following tools

. wireshark

. snort

. gcc

. gdb

. Ida

. windbg / olly / immunity debugger

. Working knowledge of PCRE and regular expressions

URL for more information:

Leave a reply



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments