Malware Reverse Engineer
IBM
The X-Force Threat Intelligence team (XFTI) offers expert malware and threat analysis to IBM customers worldwide. Our analysts respond to advanced cyber threats and provide cutting-edge research to deliver actionable threat intelligence to help organizations protect themselves against emerging threats and reduce their attack service
As a Malware Reverse Engineer, you'll completely reverse engineer malicious software, write detailed reports on command functionality, malware communications, and encryption mechanisms, and develop targeted python scripts to support identification and automation efforts.Provides expert technical analytical support and advanced malware analysis support to the X-Force Threat Intel and Incident Response teams.Provides industry-leading malware analysis for advanced cyber threat incidents and research support across several security domains in an exciting and growing security delivery organization within IBM.Will work with IBM X-Force Incident Response teams to triage cyber threat activity, cooperate across IBM proprietary telemetry to model threats, and support analysts writing intelligence research.Proactively searching for indicators of compromise (IOCs), performing in-depth analysis of incident data, and contributing to incident response efforts by providing actionable insights and recommendations in a timely fashion.
As a Malware Reverse Engineer, you'll completely reverse engineer malicious software, write detailed reports on command functionality, malware communications, and encryption mechanisms, and develop targeted python scripts to support identification and automation efforts.Provides expert technical analytical support and advanced malware analysis support to the X-Force Threat Intel and Incident Response teams.Provides industry-leading malware analysis for advanced cyber threat incidents and research support across several security domains in an exciting and growing security delivery organization within IBM.Will work with IBM X-Force Incident Response teams to triage cyber threat activity, cooperate across IBM proprietary telemetry to model threats, and support analysts writing intelligence research.Proactively searching for indicators of compromise (IOCs), performing in-depth analysis of incident data, and contributing to incident response efforts by providing actionable insights and recommendations in a timely fashion.
Confirm your E-mail: Send Email