Passionate about outdoing adversaries/competitors.Demonstrated high-level understanding of the Windows OS environment and malwares.Expert knowledge of memory forensics to identify and understand memory resident malware.Nominal understanding of regular expression and proficient in programming (.NET, C/C++) and scripting languages.Demonstrated knowledge of Linux/UNIX, Mac & Windows operating systems.Some of the key requirements that I have extensive experience with include: I reviewed the requirements of the job opening and I believe my candidacy is an excellent fit for this position. In my previous role, I was responsible for in depth malware analysis and reverse engineering (Static Analysis, Dynamic Analysis, Memory Analysis, Code Analysis - Debugging, De-Compiling, Compiling, De-Obfuscating, Assembly)) to determine the nature of unknown or potentially malicious files found during investigations. I am including my resume that lists my qualifications and experience. Please consider me for the malware analyst opportunity. Basic understanding of Advanced persistent threats and botnets.Some Experience with log management software and/or siem.Understanding of computer networking architectures and DNS.Some understanding on Computer and network forensic analysis.Some knowledge on Malware families, attack vectors, propagation, Malware analysis / reverse engineering.Some understanding of OWASP Framework and secure coding.MSCE, CCNA, CCNO, and/or CISSP certification(s).Requires certification with a CND discipline, Certified Reverse Engineering Analyst (CREA), or GIAC Certified (Cyber Defense, Penetration Testing, Developer, or Digital Forensics and Incident Response).My experience is an excellent fit for the list of requirements in this job: In the previous role, I was responsible for targeted attack detection and analysis, including the development of custom signatures and log queries and analytics for the identification of targeted attacks. I submit this application to express my sincere interest in the malware analyst position. IDA Pro disassembler, Ollydbg & Hex-Rays Decompiler.Experience in identifying and defeating malware defense mechanism such as anti-reverse, anti-debug, and anti-virtual machine.Has an in-depth understanding of security concepts, protocols, processes, architectures, and tools (authentication and access control technologies, intrusion detection, network traffic analysis, incident handling, media/malware analysis, ), malware and programming skills to include C/C++ and Assembly language, and detailed understanding of how network-based attacks work at the operating system and/or protocol level.Experience with system analysis, reverse engineering, and static, dynamic, and best-practice malware analytical methodologies on Windows, Android, or UNIX-based platforms.Experience with in-depth detailed research of software and methodologies to build technical capabilities.A minimum of DOD 8140/DOD 8570 IAM Level I Certification.A minimum of DoD 8140/DoD 8570 IAM Level II Certification (CISSP, CASP CE, CSSLP).Please consider my experience and qualifications for this position: In my previous role, I was responsible for cyber threat and intelligence analysis, and develops briefings and reports to distribute and aid in information sharing and protection efforts. Please accept this letter and the attached resume. I would like to submit my application for the malware analyst opening.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |