Remote Malware Reverse Engineer; 'White Hat'; DC Area at ThreatConnect ๐Ÿ“ˆ Open Startup
RSS
API
Remote HealthPost a Job

get a remote job
you can do anywhere

The largest collection of Remote Jobs for Digital Nomads online. Get a remote job you can do anywhere at Remote Companies like Buffer, Zapier and Automattic who embrace the future. There are 38,700+ jobs that allow you to work anywhere and live everywhere.

The largest collection of Remote Jobs for Digital Nomads online. Get a remote job you can do anywhere at Remote Companies like Buffer, Zapier and Automattic who embrace the future. There are 38,700+ jobs that allow you to work anywhere and live everywhere.

  Jobs

  People

๐Ÿ‘‰ Hiring for a remote Engineer position?

Post a Job - $299
on the ๐Ÿ† #1 remote jobs board
The first health insurance for remote startups
A fully equipped health insurance that works for all your global employees

ThreatConnect


Malware Reverse Engineer; 'white Hat'; DC Area

Malware Reverse Engineer; 'white Hat'; DC Area


ThreatConnect


engineer

engineer

5yr

Stats (beta): ๐Ÿ‘ 924 views,โœ๏ธ 0 applied (0%)
\nThreatConnect, Inc. is the leading provider of advanced threat intelligence products and services on the market today. We deliver a single platform in the cloud and on-premises to effectively aggregate, analyze, and act to counter sophisticated cyber-attacks.\n\nOur ThreatConnect Intelligence Research Team (TCIRT) is actively is seeking an experienced Senior Malware Research/Reverse Engineer to join our growing team. The TCIRT mission is to drive product innovation, develop analytics, find existing and emergent threats, and represent these findings within ThreatConnect.\n\n The ideal candidate will be responsible for conducting day-to-day in-depth malware analysis and triage as well as seek new and innovative ways to engineer and automate the ThreatConnect analysis platform. You will apply engineering processes and techniques to automate the analysis of malicious software at scale--at times diligently creating workarounds, patches and parallel workflows to “beat” malware with anti-analysis features.\n\n It is strongly preferred that you also have demonstrated works--such as research, presentations, blogs, whitepapers, or ThreatConnect Community shares that highlight your ability to conduct analysis using infrastructure analysis, in-depth malware analysis, or malware triage and YARA rule creation.\n\nOur ideal team member would be able to work remotely, with little in-office supervision, and work closely with our T-CIRT, development,and engineering teams to influence product features and provide direct input to the vision of the ThreatConnect platform.

See more jobs at ThreatConnect

# How do you apply? This job post is older than 30 days and the position is probably filled. Try applying to jobs posted recently instead.
Apply for this Job

๐Ÿ‘‰ Please reference you found the job on Remote OK, this helps us get more companies to post here!

When applying for jobs, you should NEVER have to pay to apply. That is a scam! Posts that link to pages with "how to work online" are also scams. Don't use them or pay for them. Also always verify you're actually talking to the company in the job post and not an imposter. Scams in remote work are rampant, be careful! When clicking on the button to apply above, you will leave Remote OK and go to the job application page for that company outside this site. Remote OK accepts no liability or responsibility as a consequence of any reliance upon information on there (external sites) or here.

by levels.io