We are seeking an enthusiastic and skilled individual to join our team as a Malware Research Analyst Intern. This is a fantastic opportunity for someone looking to gain hands-on experience in malware analysis, reverse engineering, and threat intelligence.
This role involves supporting research projects, developing processes, defining priorities, following deadlines, and delivering materials to the right teams. You will have the opportunity to work with various stakeholders, including developers, analysts, researchers, marketing, PR, sales, and more.
* You will be responsible for analyzing and understanding malicious code, including Windows PE, .Net, OLE2, JS, VBS, HTML, PDF, SWF, ELF, and other file formats.
* Additionally, you will be working with Linux OS distributions, Linux API/kernel/POSIX standards, and excellent knowledge of Windows PE file format.
* Strong communication skills are essential, as you will be working with developers, analysts, researchers, marketing, PR, sales, and more.
Required Skills and Qualifications:
1. Knowledge and Experience:
2. x86/x64 Intel Assembly (at least 1 year)
3. Basic knowledge of WinAPI
4. ID A Disassembler, HIEW, OllyDbg, or Windbg to analyze PE files (at least 1 year)
5. Executable file analysis skills in a hexadecimal editor (Hiew, 010, etc...)
6. Deep knowledge in several fields: mobile device security and mobile malware, statistical analysis, methods of protection against threats, security best practices, polymorphic malware, rootkits/bootkits, Knowledge and skills needed to analyze and understand non-standard threats (MacOS X, ICS, SCADA, ARM, QNX, UEFI/BIOS, etc...), Good knowledge of file formats (archive, image, sound, video, etc...)
7. Some experience in programming languages (Python, C#, C, C++) [At least 1 year in any]
8. Other Requirements:
9. Fluency in English is Mandatory
10. Good communication skills; work with developers, analysts, researchers, marketing, PR, sales (etc.) using