𝗖𝗼𝗿𝗲 𝗦𝗸𝗶𝗹𝗹𝘀 𝗪𝗲’𝗿𝗲 𝗟𝗼𝗼𝗸𝗶𝗻𝗴 𝗙𝗼𝗿 (𝗠𝘂𝘀𝘁-𝗛𝗮𝘃𝗲)
5–10+ years of hands-on experience in 𝗠𝗮𝗹𝘄𝗮𝗿𝗲 𝗔𝗻𝗮𝗹𝘆𝘀𝗶𝘀, 𝗥𝗲𝘃𝗲𝗿𝘀𝗲 𝗘𝗻𝗴𝗶𝗻𝗲𝗲𝗿𝗶𝗻𝗴, 𝗗𝗙𝗜𝗥, 𝗼𝗿 𝗧𝗵𝗿𝗲𝗮𝘁 𝗥𝗲𝘀𝗲𝗮𝗿𝗰𝗵
Perform 𝘀𝘁𝗮𝘁𝗶𝗰 𝗮𝗻𝗱 𝗱𝘆𝗻𝗮𝗺𝗶𝗰 𝗺𝗮𝗹𝘄𝗮𝗿𝗲 𝗮𝗻𝗮𝗹𝘆𝘀𝗶𝘀 on APT toolkits, ransomware, rootkits, trojans, loaders, and zero-day artifacts
Strong expertise in 𝗿𝗲𝘃𝗲𝗿𝘀𝗲 𝗲𝗻𝗴𝗶𝗻𝗲𝗲𝗿𝗶𝗻𝗴 𝗼𝗯𝗳𝘂𝘀𝗰𝗮𝘁𝗲𝗱 𝗮𝗻𝗱 𝗽𝗮𝗰𝗸𝗲𝗱 𝗯𝗶𝗻𝗮𝗿𝗶𝗲𝘀
Proficient with industry RE tools: 𝗚𝗵𝗶𝗱𝗿𝗮, 𝗜𝗗𝗔 𝗣𝗿𝗼, 𝗕𝗶𝗻𝗮𝗿𝘆 𝗡𝗶𝗻𝗷𝗮, 𝘅𝟲𝟰𝗱𝗯𝗴, 𝗥𝗮𝗱𝗮𝗿𝗲𝟮
Deep understanding of 𝗮𝘀𝘀𝗲𝗺𝗯𝗹𝘆 (𝘅𝟴𝟲/𝘅𝟲𝟰/𝗔𝗥𝗠) and low-level system behavior
Strong knowledge of 𝗪𝗶𝗻𝗱𝗼𝘄𝘀 & 𝗟𝗶𝗻𝘂𝘅 𝗶𝗻𝘁𝗲𝗿𝗻𝗮𝗹𝘀, memory forensics, and kernel concepts
Experience with 𝗣𝗘 𝗳𝗶𝗹𝗲 𝗳𝗼𝗿𝗺𝗮𝘁, DLL injection, API hooking, and exploit unpacking
Develop 𝗬𝗔𝗥𝗔 𝗿𝘂𝗹𝗲𝘀, 𝗱𝗲𝘁𝗲𝗰𝘁𝗶𝗼𝗻 𝗹𝗼𝗴𝗶𝗰, 𝗮𝗻𝗱 𝗜𝗢𝗖 𝗽𝗮𝗰𝗸𝗮𝗴𝗲𝘀 for SOC and IR teams
Investigate 𝗔𝗣𝗧 𝗰𝗮𝗺𝗽𝗮𝗶𝗴𝗻𝘀, 𝗺𝗮𝗹𝘄𝗮𝗿𝗲 𝗳𝗮𝗺𝗶𝗹𝗶𝗲𝘀, 𝗮𝗻𝗱 𝗮𝗱𝘃𝗲𝗿𝘀𝗮𝗿𝘆 𝗧𝗧𝗣𝘀
Produce high-quality 𝘁𝗵𝗿𝗲𝗮𝘁 𝗶𝗻𝘁𝗲𝗹𝗹𝗶𝗴𝗲𝗻𝗰𝗲 𝗿𝗲𝗽𝗼𝗿𝘁𝘀 aligned with 𝗠𝗜𝗧𝗥𝗘 𝗔𝗧𝗧&𝗖𝗞
Correlate malware findings with telemetry and external threat intelligence sources
Support 𝗗𝗙𝗜𝗥 𝗶𝗻𝘃𝗲𝘀𝘁𝗶𝗴𝗮𝘁𝗶𝗼𝗻𝘀, including memory, disk, and log analysis
Validate malware impact, persistence mechanisms, and lateral movement techniques
Hands-on experience with malware sandboxes: 𝗖𝗔𝗣𝗘, 𝗖𝘂𝗰𝗸𝗼𝗼, 𝗔𝗻𝘆.𝗥𝘂𝗻
Participate in 𝗰𝗼𝗻𝘁𝗮𝗶𝗻𝗺𝗲𝗻𝘁, 𝗲𝗿𝗮𝗱𝗶𝗰𝗮𝘁𝗶𝗼𝗻, 𝗮𝗻𝗱 𝘁𝗲𝗰𝗵𝗻𝗶𝗰𝗮𝗹 𝗿𝗼𝗼𝘁-𝗰𝗮𝘂𝘀𝗲 𝗮𝗻𝗮𝗹𝘆𝘀𝗶𝘀
Create detailed 𝗺𝗮𝗹𝘄𝗮𝗿𝗲 𝘁𝗲𝗮𝗿𝗱𝗼𝘄𝗻 𝗿𝗲𝗽𝗼𝗿𝘁𝘀, 𝘁𝗲𝗰𝗵𝗻𝗶𝗰𝗮𝗹 𝗯𝗿𝗶𝗲𝗳𝘀, 𝗮𝗻𝗱 𝗲𝘅𝗲𝗰𝘂𝘁𝗶𝘃𝗲 𝘀𝘂𝗺𝗺𝗮𝗿𝗶𝗲𝘀
𝗣𝗿𝗲𝗳𝗲𝗿𝗿𝗲𝗱 / 𝗚𝗼𝗼𝗱 𝘁𝗼 𝗛𝗮𝘃𝗲
Certifications: 𝗚𝗥𝗘𝗠, 𝗢𝗦𝗖𝗘, 𝗢𝗦𝗘𝗘, 𝗢𝗦𝗘𝗗, 𝗚𝗖𝗙𝗔, 𝗚𝗖𝗜𝗔, 𝗙𝗢𝗥𝟲𝟭𝟬 / 𝗙𝗢𝗥𝟳𝟭𝟬
Published malware research, blogs, or technical write-ups
Experience in 𝗴𝗼𝘃𝗲𝗿𝗻𝗺𝗲𝗻𝘁 𝗼𝗿 𝗵𝗶𝗴𝗵𝗹𝘆 𝗿𝗲𝗴𝘂𝗹𝗮𝘁𝗲𝗱 𝗲𝗻𝘃𝗶𝗿𝗼𝗻𝗺𝗲𝗻𝘁𝘀
Strong documentation, reporting, and stakeholder communication skills