About the Client
Our client is a global financial institution serving millions of consumers and businesses worldwide. Their continued success depends on maintaining a strong and adaptive cyber defense posture that protects operations across more than 35 countries. The Malware Defense team plays a critical role in this mission—safeguarding clients, assets, and trust against evolving cyber threats.
Role Overview
As a Specialist Information Security Engineer, you will be part of the Malware Defense Team responsible for identifying, analyzing, and responding to malware-based threats in real time. This role requires deep analytical skills, hands-on malware analysis experience, and a proactive approach to improving detection and defense mechanisms.
Key Responsibilities
- Respond to and triage real-time malware incidents, prioritizing threats effectively.
- Perform static, dynamic, and behavioral analysis of malicious files, URLs, and indicators of compromise (IoCs).
- Document analysis findings comprehensively, providing clear recommendations and reports.
- Identify cyber risks and collaborate with stakeholders to strengthen detection controls and preventive measures.
- Work closely with Incident Response teams to contain and remediate threats, contributing to continuous improvement of defense capabilities.
Who You Are
- 3–5 years of hands-on experience in malware analysis and incident response.
- Strong investigative mindset with the ability to drive process improvements and control enhancements.
- Background in one or more threat prevention domains - Email, Web, or Endpoint.
Preferred Skill Set
- Understanding of browser exploitation and web abuse techniques.
- Familiarity with JavaScript, HTML, and how threat actors misuse these technologies.
- Proficiency in analyzing email headers and detecting phishing or malicious email content.
- SIEM experience (event correlation, alert tuning, and threat hunting).
- Exposure to tools like Process Monitor, FakeDNS, Regshot, or Wireshark.
- Experience with sandbox environments and interpreting automated malware analysis results.
- Skilled at extracting IoCs (domains, IPs, file hashes) and using URL categorization or proxy tools (e.g., Fiddler, commercial sandboxes, web proxies).
- Strong communication and documentation skills - able to present findings clearly to both technical and non-technical audiences.
- Knowledge of EDR platforms, forensic artifacts (browser, registry, event logs), and system internals.
Nice to Have
- 3+ years of full-cycle malware analysis in Email, Web, or Endpoint domains.
- 3+ years in incident response and/or digital forensics.
- Familiarity with cloud environments (AWS, Azure, GCP).
- Experience in scripting or automation (Python, PowerShell, etc.).
- Ability to conduct structured technical interviews with an investigative mindset.
Don\'t miss out on this chance to be a part of a dynamic and growing team. Take the Next Step in your career journey with us!
- To apply, please submit your updated resume along with your notice period, current salary package details, including base salary, incentives, annual wage supplement, and expected salary.
- Click on the 'Apply here' button to drop your resume directly or email it to susmita.sahu@adecco.com.
- Our team will review all applications and contact shortlisted candidates for further steps in the selection process.
Susmita Sahu
EA License No: 91C2918
Personnel Registration Number: R23114076