2,986 Malware Analysis jobs in the United States
Information Security Analyst - Threat Intelligence
Posted 2 days ago
Job Viewed
Job Description
Senior Security Analyst - Threat Intelligence
Posted 6 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor and analyze security alerts and logs for potential threats.
- Investigate and respond to security incidents in a timely and effective manner.
- Conduct vulnerability assessments and penetration testing.
- Develop and implement security policies, procedures, and best practices.
- Stay current with emerging threats, vulnerabilities, and security technologies.
- Manage and configure security tools, including SIEM, IDS/IPS, and EDR solutions.
- Create detailed incident reports and recommend remediation actions.
- Provide security awareness training to employees.
- Collaborate with IT and other departments on security-related matters.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- Minimum of 5 years of experience in information security, with a focus on threat intelligence and incident response.
- Proven experience with SIEM, IDS/IPS, EDR, and other security technologies.
- Strong understanding of network protocols, operating systems, and cybersecurity principles.
- Experience with security frameworks and compliance standards (e.g., NIST, ISO 27001).
- Excellent analytical, problem-solving, and critical-thinking skills.
- Relevant certifications such as CISSP, GIAC, or CompTIA Security+ are a plus.
- Ability to work independently and as part of a team in a fast-paced environment.
Senior Security Analyst - Threat Intelligence
Posted 9 days ago
Job Viewed
Job Description
Responsibilities will include:
- Monitoring and analyzing threat intelligence feeds from various sources to identify emerging threats and vulnerabilities relevant to our client's industry and infrastructure.
- Developing and maintaining threat models and profiles of known and emerging adversaries.
- Conducting in-depth research on specific threat actors, campaigns, and malware families.
- Translating raw intelligence into actionable insights and recommendations for security operations, incident response, and risk management teams.
- Creating comprehensive reports and presentations on threat intelligence findings for both technical and executive audiences.
- Developing and implementing intelligence collection requirements and processes.
- Collaborating with internal security teams to integrate threat intelligence into security controls, detection rules, and incident response playbooks.
- Staying abreast of the latest security technologies, trends, and best practices in cybersecurity and threat intelligence.
- Mentoring junior analysts and contributing to the overall growth of the threat intelligence program.
Qualifications:
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field, or equivalent practical experience.
- 5+ years of experience in information security, with a significant focus on threat intelligence, security operations, or incident response.
- Proven expertise in analyzing various types of threat intelligence (e.g., TTPs, IoCs, malware analysis).
- Strong understanding of cyber kill chain, MITRE ATT&CK framework, and other relevant security frameworks.
- Proficiency in scripting languages (e.g., Python, PowerShell) for automation and data analysis.
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong written and verbal communication skills, with the ability to clearly articulate complex technical information.
- Relevant security certifications (e.g., CISSP, GCTI, CTIA) are a plus.
Information Security Analyst (Threat Intelligence)
Posted 21 days ago
Job Viewed
Job Description
Senior Security Analyst, Threat Intelligence
Posted 22 days ago
Job Viewed
Job Description
Information Security Analyst - Threat Intelligence
Posted 22 days ago
Job Viewed
Job Description
Key responsibilities include correlating threat data from multiple sources, assessing the potential impact of identified threats on the organization, and developing actionable intelligence reports for security operations and incident response teams. You will contribute to the development and refinement of security policies and procedures based on threat intelligence findings. The analyst will also participate in incident response activities, providing crucial context and analysis during security breaches. Collaboration with internal security teams, as well as external partners and information sharing communities, is essential to stay ahead of evolving threats.
The ideal candidate will possess a Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field. A minimum of 4 years of experience in information security, with a specific focus on threat intelligence, security operations, or incident response, is required. Certifications such as CISSP, CEH, or GIAC certifications are highly desirable. Strong knowledge of cyber threat actors, attack vectors, malware analysis, and defensive security strategies is essential. Proficiency in security information and event management (SIEM) tools, threat intelligence platforms, and data analysis techniques is a must. Excellent written and verbal communication skills, with the ability to articulate complex technical information clearly and concisely, are critical. This hybrid role offers a balanced approach to remote work and in-office collaboration, providing flexibility while fostering teamwork within our security department in Dallas, Texas, US . Join us in safeguarding our organization against the ever-evolving landscape of cyber threats.
Information Security Analyst - Threat Intelligence
Posted 22 days ago
Job Viewed
Job Description
The ideal candidate will possess a Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field, along with 3-5 years of experience in information security, with a focus on threat intelligence, security operations, or incident response. Strong analytical and investigative skills are paramount, along with a deep understanding of common attack vectors, malware types, and threat actor tactics, techniques, and procedures (TTPs). Experience with threat intelligence platforms, security information and event management (SIEM) systems, and various security tools (e.g., IDS/IPS, endpoint detection and response) is essential. You should be adept at researching and correlating threat data from open-source and commercial intelligence feeds. Excellent written and verbal communication skills are required to articulate complex technical information to both technical and non-technical audiences, including developing threat advisories and incident reports. Certifications such as CompTIA Security+, CEH, or GIAC certifications are a plus.
Key Responsibilities:
- Monitor and analyze security alerts and logs for potential threats and intrusions.
- Gather, process, and analyze threat intelligence from multiple sources.
- Identify and track emerging cybersecurity threats and attack trends.
- Assess the risk and impact of identified threats to the organization.
- Develop and implement threat mitigation strategies and security recommendations.
- Respond to and investigate security incidents, providing timely analysis and containment.
- Create and maintain documentation on threat landscape, incidents, and response procedures.
- Collaborate with internal teams and external partners on security matters.
- Stay updated on the latest cybersecurity threats, vulnerabilities, and defense techniques.
- Contribute to the continuous improvement of security monitoring and incident response capabilities.
Be The First To Know
About the latest Malware analysis Jobs in United States !
Security Analyst
Posted 4 days ago
Job Viewed
Job Description
We'll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world.
Today's world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of almost 950 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust.
Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value.
**The opportunity**
The Internal Investigations Services (IIS) team is responsible for responding to cyber security incidents and events caused by EY Personnel, Contractors and Associates globally. The scope of IIS also includes performing computer forensic reviews and managing eDiscovery requests supporting General Counsel.
Senior Specialist Internal Investigations Services acts as a lead technical investigator for information gathering, analysis and reporting in support of digital forensic investigations
**Your key responsibilities**
+ Leads security investigations and eDiscovery matters
+ Produces fact-based technical reports detailing events over specified periods of time for the investigation and shares the reports with stakeholders to act upon
+ Advise and assist stakeholders on the relevance of information derived from internal and external sources associated with information security matters, digital forensic inquiries, and investigative work
+ Identify and propose areas for improvement in IIS processes and procedures
**Skills and attributes for success**
In depth technical knowledge (IT infrastructure, forensic tools, forensic methodologies)
+ Strong investigative and analytical mentality, and problem-solving skills
+ Able to see the comprehensive picture based on the correlation of the data captured from the various data sources
+ Ability to multitask in a time sensitive environment with awareness of confidentiality and local privacy laws
+ Flexibility to adjust to multiple demands, ambiguity and rapid change environment
+ Global approach for working with different cultures and backgrounds
+ Excellent teaming skills
+ Ability to team well with others to facilitate and enhance the understanding & compliance to security policies
+ Knowledge of existing and emerging legal issues within information security environments (i.e., data privacy)
+ Possess an efficient and versatile communication style
+ Proven integrity and judgment within a professional environment
+ Ability to work in a global environment (Virtual teaming, multiple jurisdictions)
+ Experiences in investigation case management
+ A strong information security background and knowledge to speak thoughtfully to both technical and non-technical teams
+ Ability to appropriate balance work/personal priorities
+ Understanding of the Big 4 workplace culture and business structure
+ Conduct interview skills with investigative mind-set, supporting GCO from a technical perspective
**Other Requirements:**
Some weekend work should be expected
**To qualify for the role you must have**
**Education:**
Bachelor or Master Degree in Computer Science or a related field
**Experience** :
+ 5-10 years of experience in one or more of the following:
+ Information Security, demonstrating experience in investigative unit and incident response.
+ Information Security, in depth understanding of cyber investigation, forensic tools, and methodologies, including: log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes
+ Be familiar with a basic understanding of legalities surrounding discovery and analysis of electronically stored information
+ Experience with Forensic tools such as Encase, F-Response, FTK, Nuix, Axiom,.
+ Experience with Microsoft Purview, Defender and other monitoring tools
+ Familiar with Microsoft environment (Exchange, SharePoint, Purview , Sentinel, Azure.)
+ Knowledge of scripting languages such as Python to automate collection
+ Experience with PowerShell
**Experience in reporting to Senior Leadership Certification Requirements:**
Candidates must hold or be actively pursuing related professional certifications such as CISSP, Security+, EnCE, ACE, GCFE, GCIA
Ability to obtain and maintain Security Clearance if assigned in US
**Ideally, you'll also have**
+ Certifications demonstrating interest and development of Soft Skills
**What we look for**
Understanding the impact and associated risks data security incidents cause for the Business and EY as a Company, you will handle incoming requests in a timely and appropriate manner.
**What we offer you**
The compensation ranges below are provided in order to comply with United States pay transparency laws. Other geographies will follow their local salary guidelines, which may not be a direct conversion of published US salary ranges. At EY, we'll develop you with future-focused skills and equip you with world-class experiences. We'll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn more .
+ We offer a comprehensive compensation and benefits package where you'll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $91,100 to $70,400. The base salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is 109,300 to 193,600. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options.
+ Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year.
+ Under our flexible vacation policy, you'll decide how much vacation time you need based on your own personal circumstances. You'll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.
**Are you ready to shape your future with confidence? Apply today.**
EY accepts applications for this position on an on-going basis.
For those living in California, please click here for additional information.
EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities.
**EY | Building a better working world**
EY is building a better working world by creating new value for clients, people, society and the planet, while building trust in capital markets.
Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow.
EY teams work across a full spectrum of services in assurance, consulting, tax, strategy and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories.
EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis, including arrest and conviction records, in accordance with applicable law.
EY is committed to providing reasonable accommodation to qualified individuals with disabilities including veterans with disabilities. If you have a disability and either need assistance applying online or need to request an accommodation during any part of the application process, please call 1-800-EY-HELP3, select Option 2 for candidate related inquiries, then select Option 1 for candidate queries and finally select Option 2 for candidates with an inquiry which will route you to EY's Talent Shared Services Team (TSS) or email the TSS at .
Security Analyst
Posted 4 days ago
Job Viewed
Job Description
Leidos is seeking a Security Engineer to support the execution of strategic, operational, and organizational PPSM objectives. This position can be based out of any of our three locations - Alexandria, VA, Fort Meade, MD, or Chambersburg, PA.The position is primarily on-site, but partial telework may be available at the discretion of our customer and program management.
Responsibilities:
+ Ensure compliance with DoD-approved standards, architectures, and guidelines (e.g., DISN) and conduct quality assurance of all VA, IA security engineering analysis, QA, systems and application security implementation strategies and measures for cybersecurity and RMF
+ Analyze current and emerging net-centric requirements and track the PPSM portfolio's readiness to meet these requirements
+ Identify and implement automation opportunities across PPSM processes
+ Manage the PPSM Registry Database User Accounts, PPSM Registry database system data entry, and data export to unique data formats to externals database administrators.
+ Respond to inquiries and registration requests for ports, protocols, and services
+ Provide timely, regular performance metrics to the Government and support a variety of presentations, briefings and reports
+ Develop technical papers on PPSM and cybersecurity-related topics
+ Support communication of deliverables with PPSM leadership and stakeholders (e.g., RE41)
Requirements:
+ Bachelor's degree (IT-related field preferred) and five (5) years of experience in cybersecurity or network security position. Additional relevant experience may be considered in lieu of degree.
+ Active DoD Top Secret clearance with SCI eligibility required
+ DoD 8570 IAM II or IAT II certification
+ Proficiency in PPSM Registry management, eMASS, and DISA DMZ Whitelist processes
+ Demonstrable experience with network security, ports/protocols, firewalls, and boundary protection
+ Experience in vulnerability management and assessment
+ Understanding of network architectures, LAN/WAN, TCP/IP, routing, and switching
+ Strong understanding of NIST 800-53, , DISA security policies, and compliance monitoring
+ Excellent written and verbal communication for technical documentation and stakeholder engagement
If you're looking for comfort, keep scrolling. At Leidos, we outthink, outbuild, and outpace the status quo - because the mission demands it. We're not hiring followers. We're recruiting the ones who disrupt, provoke, and refuse to fail. Step 10 is ancient history. We're already at step 30 - and moving faster than anyone else dares.
**Original Posting:**
September 30, 2025
For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
**Pay Range:**
Pay Range $67,600.00 - $122,200.00
The Leidos pay range for this job level is a general guideline onlyand not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
REQNUMBER: R- -OTHLOC-PL-2D2020
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status. Leidos will consider qualified applicants with criminal histories for employment in accordance with relevant Laws. Leidos is an equal opportunity employer/disability/vet.
Security Analyst
Posted 4 days ago
Job Viewed
Job Description
As a Security Analyst at Waystar, you will play a vital role in detecting, analyzing, and responding to cybersecurity threats in real-time. You'll work within our Security Operations Center (SOC), leveraging advanced tools to protect our hybrid cloud infrastructure. This position offers hands-on experience with threat intelligence, incident response, and proactive threat hunting in a collaborative, fast-paced environment.
**WHAT YOU'LL DO**
+ Monitor and analyze security alerts and logs 24/7/365 using SIEM, EDR, IDS/IPS, and threat intelligence platforms.
+ Investigate potential security incidents to determine scope, impact, and severity.
+ Conduct root cause analysis and assist in containment, eradication, and recovery efforts.
+ Participate in threat hunting activities to proactively detect and mitigate emerging threats.
+ Collaborate with internal teams (IT, DevOps, Compliance) to resolve incidents and implement preventive controls.
+ Create, maintain, and improve technical documentation and standard operating procedures (SOPs) for security incident detection and response.
+ Assist in tuning and maintaining security tools and rulesets to enhance detection capabilities.
+ Create and deliver reports on security incidents, trends, and metrics to SOC leadership and stakeholders.
+ Contribute to user education initiatives and security awareness training across the organization.
**WHAT YOU'LL NEED**
+ 2+ years of experience working in a Security Operations Center (SOC) or in a hands-on threat detection and response role.
+ Understanding of Linux, Windows, and MacOS fundamentals.
+ Strong understanding of security fundamentals, attack techniques (e.g., MITRE ATT&CK), and threat landscapes.
+ Hands-on experience with log analysis, data correlation, and forensic investigation.
+ Proficiency with security tools such as:
+ SIEM (e.g., Chronicle, QRadar)
+ EDR (e.g., CrowdStrike, SentinelOne)
+ IDS/IPS (e.g., Suricata, Snort)
+ Threat Intelligence Platforms (TIPs)
+ Familiarity with hybrid cloud environments (e.g., AWS, Azure, GCP) and modern infrastructure models.
+ Solid grasp of incident response lifecycle: detection, triage, containment, eradication, recovery, and post-mortem.
+ Knowledge of NIST, CIS Controls, or other security frameworks.
+ Excellent written and verbal communication skills with the ability to explain technical topics to non-technical stakeholders.
+ The ability to create precise technical documentation.
+ Ability to stay calm and focused under pressure and during high-severity incidents.
**Preferred Qualifications**
+ Relevant certifications such as: **CompTIA Security+** , **CySA+** , **GCIH** , **GCIA** , **Network+** , or equivalent
+ Experience with automation and scripting (e.g., Python, PowerShell, SOAR tools).
+ Exposure to compliance standards such as HIPAA, HITRUST, or SOC 2.
+ Experience supporting 24x7 operations or working in a rotating shift environment.
**ABOUT WAYSTAR**
Through a smart platform and better experience, Waystar helps providers simplify healthcare payments and yield powerful results throughout the complete revenue cycle.
Waystar's healthcare payments platform combines innovative, cloud-based technology, robust data, and unparalleled client support to streamline workflows and improve financials so providers can focus on what matters most: their patients and communities. Waystar is trusted by 1M+ providers, 1K+ hospitals and health systems, and is connected to over 5K commercial and Medicaid/Medicare payers. We are deeply committed to living out our organizational values: honesty; kindness; passion; curiosity; fanatical focus; best work, always; making it happen; and joyful, optimistic & fun.
Waystar products have won multiple Best in KLAS® or Category Leader awards since 2010 and earned multiple #1 rankings from Black Book surveys since 2012. The Waystar platform supports more than 500,000 providers, 1,000 health systems and hospitals, and 5,000 payers and health plans. For more information, visit waystar.com or follow @Waystar ( on Twitter.
**WAYSTAR PERKS**
+ Competitive total rewards (base salary + bonus, if applicable)
+ Customizable benefits package (3 medical plans with Health Saving Account company match)
+ We offer generous paid time off for our non-exempt team members, starting with 3 weeks + 13 paid holidays, including 2 personal floating holidays. We also offer flexible time off for our exempt team members + 13 paid holidays
+ Paid parental leave (including maternity + paternity leave)
+ Education assistance opportunities and free LinkedIn Learning access
+ Free mental health and family planning programs, including adoption assistance and fertility support
+ 401(K) program with company match
+ Pet insurance
+ Employee resource groups
Waystar is proud to be an equal opportunity workplace. We celebrate, value, and support diversity and inclusion. Qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, national origin, disability status, genetics, marital status, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws.
This applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training.
**Job Category:** Technology/Engineering
**Job Type:** Full time
**Req ID:** R2694