What are the responsibilities and job description for the Advanced Threat Research Engineer position at Prosum?
Company Description
We are a technology services company that puts people before technology. Yes, we have deep experience consulting, implementing solutions, providing managed services and staffing engagements. But we believe that, by focusing on relationships, we are better able to improve people’s experiences and lives through technology.
This human approach allows us to be more flexible, more attentive and, most importantly, to do the right thing. It also means we empower our experts to go beyond cookie-cutter solutions and create the tools that will move our clients’ businesses into the future.
Technology is at its best when it complements our natural abilities and enhances our interactions. Which is why we say that, at Prosum, we make technology human.
Prosum has over 300 employees and consultants and is headquartered in Los Angeles, CA with offices in Orange County, Denver, Phoenix, and Dallas.
Job Description
RESPONSIBILITIES
- Utilize proprietary tools and technologies and pattern matching skills to accurately identify emerging malware
- Identify new malware distribution methods
- Analyse information and develop methods of detection and removal of Malware
- Remote troubleshooting and diagnostic analysis for malware infections
- Collaborate with multiple internal engineering and cross-functional teams on technical analysis
- Manage multiple projects simultaneously while quickly learning a breadth of new concepts and technologies
- Serve as the leading point of contact to communicate and educate internal employees across all customer support locations on Webroot products
- Write, review and organize technical content that will be published to the Threat blog, FAQs and Knowledge base for use by both internal and external customers
- Perform testing functions to verify defect fixes and to assist the Quality Assurance team when needed
Qualifications
- 2 years’ experience in malware reverse engineering or equivalent experience
- 2 years’ experience in programming experience/scripting (eg. C, C , C#, Perl, Java script, Python, VBScript, etc)
- Experience in security related forums and industry events for malware, security, digital crimes
- Windows XP/Vista/7/8 32bit & 64bit Internals: (Deep understanding of the Windows Registry; PE Format; Processes/Thread/DLLs; Windows memory model; Windows Security Model - user/groups, SACL/DACL, Tokens, Desktops, etc; Virtualization; Hooking/Injection mechanisms; Usermode/Kernel mode internal structures (plus how to interpret); Dump Analysis with WinDbg; IDA Pro; x86 assembly exposure; Rootkit detection techniques)
- Excellent customer service skills addressing the needs of both the external and internal customer with strong communication and process skills
- Experience of Malware – in terms of Diagnosing and Remediation
- Excellent all-around communications skills required.
- Knowledge of Virtualization software (VMWare, Virtual PC/ Virtual Box, XEN, etc)
- Knowledge of Personal Firewalls /Anti-virus software / Anti-spyware software
Additional Information
All your information will be kept confidential according to EEO guidelines.