Enable job alerts via email!

Sr Cyber Intelligence Analyst-Remote

Freddie Mac

Atlanta (GA)

Remote

USD 80,000 - 100,000

Full time

2 days ago
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

Freddie Mac is seeking a Security Operations Center (SOC) Analyst to enhance their cybersecurity measures. This role includes evaluating security incidents, conducting malware analysis, and improving existing SOC procedures, offering a supportive environment for career advancement and cutting-edge technology engagement.

Qualifications

  • 2-3 years' experience as SOC Analyst, focusing on incident response.
  • Proficient with IBM QRadar and various operating systems.
  • Strong understanding of advanced cyber threats.

Responsibilities

  • Assess and improve SOC tools and procedures.
  • Coordinate security incident response efforts.
  • Evaluate and analyze complex malicious code.

Skills

Malware reverse engineering
Incident response
Analyzing advanced cyber threats

Education

Bachelor's Degree

Tools

IBM QRadar
Linux
TCP/IP
UNIX
MS-Windows

Job description

Employer Industry: Information Security and Cybersecurity

Why consider this job opportunity:
- Opportunity for career advancement within a Fortune Global 500 organization
- Engaging in innovative projects to enhance information security
- Supportive and collaborative work environment with talented teams
- Chance to work on cutting-edge technologies and methodologies in cybersecurity
- Involvement in critical incident response efforts and security operations

What to Expect (Job Responsibilities):
- Assess, prioritize, and take action on requests to improve existing Security Operation Center (SOC) tools and procedures
- Coordinate security incident response efforts in partnership with management to ensure resolution
- Evaluate and analyze complex malicious code using various tools and techniques
- Conduct reverse-engineering for known and suspected malware files
- Produce detailed reports on malware attributes, functionality, and detection indicators

What is Required (Qualifications):
- 2-3 years' experience as a Security Operations Center (SOC) Analyst, including incident response roles
- Experience in malware reverse engineering and sandboxing
- Proficient with IBM QRadar and significant experience with Linux, TCP/IP, UNIX, and MS-Windows
- Strong understanding of advanced cyber threats and related tools, tactics, and procedures
- Bachelor's Degree or international equivalent (preferred)

How to Stand Out (Preferred Qualifications):
- Demonstrated experience using open-source malware analysis tools (e.g., OllyDbg, Radare, GDB)
- Ability to analyze shellcode, packed, and obfuscated code
- Expertise in developing network and host-based signatures for malware identification
- Knowledge of behavioral-based threat models and security incident response strategies

#InformationSecurity #Cybersecurity #SOCAnalyst #MalwareAnalysis #CareerOpportunity

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs

Senior Cyber Threat Intelligence Analyst

PUNCH Cyber Analytics Group

Great Falls Crossing

Remote

USD 90,000 - 130,000

2 days ago
Be an early applicant

Health Information Specialist II

Davita Inc.

Connecticut

Remote

USD 80,000 - 100,000

2 days ago
Be an early applicant

Lead Cyber Threat Intelligence Analyst

Freddie Mac

Remote

USD 80,000 - 170,000

Yesterday
Be an early applicant

Health Information Specialist I - Remote

Lensa

Providence

Remote

USD 80,000 - 100,000

14 days ago

Senior Cyber Threat Intelligence Analyst Featured Washington, DC

Kaizen Lab Inc.

Washington

Remote

USD 90,000 - 150,000

30+ days ago

Princpal Cyber Intelligence Analyst

Northrop Grumman Corp. (AU)

Maryland

Remote

USD 91,000 - 137,000

30+ days ago

Health Information Specialist II (ON-SITE)

Datavant

Danbury

Remote

USD 80,000 - 100,000

30+ days ago