Technical Cybercrime Analyst (Remote)

Technical Cybercrime Analyst (Remote)

Fireeye, Inc.

Technical Cybercrime Analyst (Remote)

Details of the offer

Company DescriptionFireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. Learn more about FireEye's world-class solutions and global footprint at
Job Description
FireEye is seeking a Technical Cybercrime Analyst to join our Mandiant Intelligence’s Financial Crime team. This team identifies, tracks, and reports on financially-motivated threat actors impacting organizations across the globe. This work supports corporate and government intelligence clients as well as other divisions of FireEye.
The Technical Cybercrime Analyst will play an important role on our team, leading the investigation and analysis of financially-motivated operators. An emphasis will be placed on the identification of novel and impactful malware campaigns and intrusion activity. The successful candidate is a seasoned analyst capable of interpreting vast quantities of data from various sources and communicating those findings to both internal and external stakeholders. We encourage giving back to the community and strongly support sharing of expertise by authoring whitepapers and speaking at conferences.
Identify, assess, and track the tactics, techniques, and procedures of financially motivated threat actors using the unique data produced across all of FireEye and via your own independent research
Perform technical analysis on malicious or suspicious artifacts, attacker infrastructure, and forensic data sourced from organizations impacted by some of the world’s most capable cyber criminals
Stay current on new malware families, new capabilities and public reporting on these issues
Support the creation of custom analytic products for internal and external stakeholders based on conclusions and judgments derived from FireEye’s proprietary datasets and the analyst’s independent research
Work independently and collaborate with individuals throughout the FireEye organization to develop and coordinate the production of intelligence product
Strong understanding of cybercrime threats and the cyber criminal ecosystem
Understanding of the tools and tactics used to distribute malware
Experience analyzing malicious binaries, office files, pdf and jar files, reviewing automated sandbox reports, and reviewing network packet captures
Comfortable with scripting languages (e.g. Ruby, Python, or other)
Ability to write Yara and Snort signatures for the purpose of identifying and classifying malware
Ability to communicate complex technical concepts to non-technical people
Possesses deep subject matter expertise on several different cybercrime malware families and/or threat actors, including how they have evolved over time
Practical experience as an intelligence analyst
History of participation in industry or technology information sharing groups, formal or informal
Understanding of monetization and fraud strategies employed by cyber threat actors
Comfortable independently interacting with external audiences
4+ years experience working with malware or exploits, or engaged in either threat research or incident handling
Foreign language skills in Russian, Chinese, Arabic, Farsi, and/or other major European languagesAdditional InformationAt FireEye we are committed to our #OneTeam approach combining diversity, collaboration, and excellence. All qualified applicants will receive consideration for employment without regard to race, sex, color, religion, sexual orientation, gender identity, national origin, protected veteran status, or on the basis of disability. Requests for accommodation due to disability can be sent directly to **********.

Source: Jobs4It



Technician, laboratory (string cheese)

Responsible for the quality and appearance of the product. Run Babcock testing. Cheese grinding and calcium testing. Use of FT 120. Kjeldahl testing. Autoclave...

From Saputo Cheese Usa - New Mexico

Published a month ago

Attendant, packaging

Prepare string cheese by using a Rapid Pak and Baader. Load cheese into packaging machine. Bag all cheese called for on a daily production plan. Pack cheese...

From Saputo Cheese Usa - California

Published a month ago

Virtual intern

Requirements:- You are studying for or shall have a university degree in HR, In journalism, business, arts, or any programs providing strong English language...

From Gao Tek Inc - New York

Published a month ago

Conferences/events assistant

Requirements:- You are studying for or have a university degree in business, marketing, arts, English, journalism, education, or any programs providing strong...

From Gao Tek Inc. - New York

Published a month ago