Malware Analyst Job Description
Malware Analyst Duties & Responsibilities
To write an effective malware analyst job description, begin by listing detailed duties, responsibilities and expectations. We have included malware analyst job description templates that you can modify and use.
Sample responsibilities for this position include:
Malware Analyst Qualifications
Qualifications for a job description may include education, certification, and experience.
Licensing or Certifications for Malware Analyst
List any licenses or certifications required by the position: GREM, IAT, II, GIAC, DFIR, SANS, OSCP, III, CND, CISSP
Education for Malware Analyst
Typically a job would require a certain level of education.
Employers hiring for the malware analyst job most commonly would prefer for their future employee to have a relevant degree such as Bachelor's and University Degree in Computer Science, Computer Engineering, Engineering, Technical, Education, Information Technology, Science, Information Security, Information Systems, Graduate
Skills for Malware Analyst
Desired skills for malware analyst include:
Desired experience for malware analyst includes:
Malware Analyst Examples
Malware Analyst Job Description
- Coordinate the development of internal and public facing tools for malware analysis
- Do reverse engineering
- Select and categorize samples of malware
- Produce detection definitions
- Look for new sources of Android malware in the region of China
- Help us produce the protection against new malware that are escalating in China
- Cooperate with OEMs resolving cases
- Have experience with CJCSM 6510.01B
- Demonstrate expert-level knowledge of the X86 Instruction set
- Reverse engineer (ad fraudulent) malware on Windows systems
- At least five (5) years of experience in computer science, information systems, or network engineering
- Experience with generating regular expressions
- Knowledge of APT tactics, techniques, and procedures
- Experience with areas of persistence within Microsoft Windows OS
- Experience with Cyber incident handling
- GIAC Certified Forensics Examiner GCFE or Certified Ethical Hacker CEH Certification
Malware Analyst Job Description
- Familiarity with common malware behavior such as packers, process hollowing, anti-analysis techniques, etc
- Help gain insight/intelligence into the ad fraud community/economy via OSINT and other means
- Find vulnerabilities in our own fraud detection technologies
- Generate white papers based on our research and be a thought leader for the industry
- Work closely with our team of data scientists and research engineers to advance our fraud detection technologies
- Lead projects and mentor junior malware analysts
- Days – Monday through Friday
- Performs advanced analysis of adversary tradecraft, malicious code, and capabilities
- Serves as the expert responsible for providing expert cyber threat and intelligence technical support to all sites listed in the place of performance
- Conduct dynamic malware analysis
- Provide evidence handling, risk analysis and mitigation, and malware detection services
- Assist in the collection and parsing of raw data from intelligence feeds, open sources, partner groups, and internally-aligned cybersecurity elements as part of an all-source intelligence effort
- Knowledge of Advanced Persistent Threat (APT) tactics, techniques, and procedures
- Experience with host and network log sources as applied to investigation, IR methodology in investigations
- Knowledge of CTI analysis processes and tradecraft to include the Cyber Kill Chain and Diamond Model of Intrusion Analysis
- Experience Microsoft Windows OS / Linux / Mac OS
Malware Analyst Job Description
- Conducts vulnerability assessments/penetration tests of information systems - Ensures software standards are met
- Work closely with the Cyber Threat Intelligence division of the Focused Operations group to identify malware that originated from an APT actor
- Examine malware discovered by the Insider Threat and the Forensics divisions of the Focused Operations group to prevent further infections
- Perform deep-dive analysis into malware samples that have been attributed to APT actors in an effort to better understand their tactics, processes, and objectives
- Aid the SOC Analysts with in-depth analysis that may have malware as a root cause
- Discovers, analyzes, diagnoses, and reports on malware events, files, network intrusion, and vulnerability issues
- Derive indicators of compromise from file analysis
- Maintain currency of the Standard Operating Procedures for the section, providing updates as necessary
- Assist in instructing the Malware analyst course
- Participate in cross section meetings to help secure the security posture of the network
- Bachelors degree in Information Security or a related technical field
- Must be experienced in reverse engineering malware
- Must be familiar with systems exploitation without the assistance of toolkits like Core Impact or MSF
- A Master’s degree in computer science or related discipline
- DoD 8570 compliant by obtaining/maintaining required IAT Level III certifications such as
- Bachelor’s Degree or higher from an accredited college or university in Computer Science, Cybersecurity, Computer Engineering, or related discipline
Malware Analyst Job Description
- Oversee the technical growth of exceptional researchers, malware analysts, and developers
- Lead and manage a team of experienced malware analysts and researchers
- Guide the development of novel solutions to challenges facing incident responders, malware analysts, network defenders, and product developers
- Identify process and knowledge gaps, and fill them
- Present the current state and future plan to executives and/or highly technical experts
- Triage and respond to incidents or requests for analysis
- Collect, analyze and exploit data from various sources
- Develop actionable information in the form of technical indicators, reports, lists, rules, signatures, or indicators and warnings
- Research new software vulnerabilities and develop exploits and detection algorithms
- Hunt for new network attacks and perform behavioral malware analysis
- A minimum of six years of experience
- A minimum of four years of experience
- Minimum of DOD 8140/DOD 8570 IASAE Level II or Computer Network Defense (CND) Certification, DOD 8140/8570 CNDSP Analyst/Infrastructure Support/Incident Responder certified
- Experience supporting Anti-Malware Infrastructures and Clients
- Ability to take on a high level of responsibility, initiative, and accountability
- Adept at collecting, summarizing, and documenting highly technical content, such as software business requirements
Malware Analyst Job Description
- Be actively involved in internal tools development
- Research emerging threats, threat actors, tactics, techniques, and procedures
- Provides and reinforces security and interoperability requirements for all systems and network products and capabilities to ensure confidentiality, integrity, and availability of the information and business processes
- Have a minimum eight (8) years demonstrated/practical hands-on experience performing forensics and malware analysis in a DoD network environment
- Working knowledge and experience with varying flavors of Unix/Linux platforms, and Apple based operating systems
- Possess strong experience with obtaining forensically sound images of, but not limited to, workstations, servers, laptops, flash devices, removable media, cell phones, RAID, virtual systems
- Be able to reverse-engineer compiled executable code to examine how programs interact with their environment
- Analyze collected media for defensive cyber operations (DCO) value to understand adversary technical capabilities and Tactics, Techniques and Procedures (TTP) methods of employment
- Analyze the attack/exploit capability of malware, document, and catalog findings for future correlation
- Develop necessary procedures or scripts to identify such data
- Experience working with a software development team
- Working knowledge of the Windows
- Experience working in Information Security field with clear understanding of security policies and procedures
- Experience with implementing Application and Device Control and Host Integrity configurations
- Experience with implementing and/or supporting Splunk infrastructures
- Knowledge of formal Infrastructure engineering disciplines, hands-on experience with managing server and/or appliance infrastructure, and all phases of engineering life-cycles (SOW, BRD, Installation and Configuration document creation and support)