Kaseya Limited
Detection Engineer
Kaseya Limited, Orlando, Florida, us, 32885
Kaseya is the leading provider of complete IT infrastructure and security management solutions for Managed Service Providers (MSPs) and internal IT organizations worldwide powered by AI. Kaseya’s best-in-breed technologies allow organizations to efficiently manage and secure IT to drive sustained business success. Kaseya has achieved sustained, strong double-digit growth over the past several years and is backed by Insight Venture Partners ( www.insightpartners.com ), a leading global private equity firm investing in high-growth technology and software companies that drive transformative change in the industries they serve.Founded in 2000, Kaseya currently serves customers in over 20 countries across a wide variety of industries and manages over 15 million endpoints worldwide. To learn more about our company and our award-winning solutions, go to
www.Kaseya.com
and for more information on Kaseya’s culture, please click here:
Kaseya Culture .Kaseya is not your typical company. We are not afraid to tell you exactly who we are and our expectations. We have achieved record levels of success being BOLD, being GRITTY, being ACCOUNTABLE. The thousands of people that succeed at Kaseya are prepared to go above and beyond for the betterment of our customers, and the betterment of their careers and long-term financial wealth.We are seeking a motivated malware analyst to join our detection engineering team where you will research new threats and maintain malware to test against various Kaseya security protection and monitoring products. Your purpose will be to help ensure Kaseya’s customers and partners can respond effectively to whatever cyber threats impact them and our shared customers.Responsibilities:Conduct research into the latest malware and adversary Tactics, Techniques, and Procedures (“TTP”).Conduct static and dynamic analysis of malware to categorize them and assist the detection engineering team in building detections and mitigations against various classes of malware.Maintain a repository of working malware and ransomware for which we can test our various security products.Simulate adversary attacks to validate new and existing detection logic to improve detection efficacy.Collaborate with supported security product teams to identify coverage gaps and areas for improving detection.Serve as a technical resource to security operations centers (SOC) during active response efforts with relation to the use of our detection capabilities.Required Skills:At least 2 years experience analyzing and handling malware, performing incident response, threat hunting or digital forensics.Proficiency with various static malware analysis tools.Proficiency with at least one dynamic malware analysis tool.Working knowledge of common malware families and common adversary tactics, techniques, and procedures (e.g. MITRE ATT&CK).General knowledge of Windows, Linux or MacOS operating system internals.Desired Skills:Bachelor's degree or equivalent IT work experience.A strong candidate will have the GIAC Reverse Engineering Malware Certification (GREM) or similar.A strong candidate would also have the book “Practical Malware Analysis” by Sikorski and Honig be on their bookshelf.Familiarity with a scripting language like bash or PowerShell.One or more baseline cybersecurity certifications like SEC+, CEH, GCFA, GCFE, GNFA, or OSCP Certifications.Join the Kaseya growth rocket ship and see how we are #ChangingLives!Additional informationKaseya provides equal employment opportunity to all employees and applicants without regard to race, religion, age, ancestry, gender, sex, sexual orientation, national origin, citizenship status, physical or mental disability, veteran status, marital status, or any other characteristic protected by applicable law.
#J-18808-Ljbffr
www.Kaseya.com
and for more information on Kaseya’s culture, please click here:
Kaseya Culture .Kaseya is not your typical company. We are not afraid to tell you exactly who we are and our expectations. We have achieved record levels of success being BOLD, being GRITTY, being ACCOUNTABLE. The thousands of people that succeed at Kaseya are prepared to go above and beyond for the betterment of our customers, and the betterment of their careers and long-term financial wealth.We are seeking a motivated malware analyst to join our detection engineering team where you will research new threats and maintain malware to test against various Kaseya security protection and monitoring products. Your purpose will be to help ensure Kaseya’s customers and partners can respond effectively to whatever cyber threats impact them and our shared customers.Responsibilities:Conduct research into the latest malware and adversary Tactics, Techniques, and Procedures (“TTP”).Conduct static and dynamic analysis of malware to categorize them and assist the detection engineering team in building detections and mitigations against various classes of malware.Maintain a repository of working malware and ransomware for which we can test our various security products.Simulate adversary attacks to validate new and existing detection logic to improve detection efficacy.Collaborate with supported security product teams to identify coverage gaps and areas for improving detection.Serve as a technical resource to security operations centers (SOC) during active response efforts with relation to the use of our detection capabilities.Required Skills:At least 2 years experience analyzing and handling malware, performing incident response, threat hunting or digital forensics.Proficiency with various static malware analysis tools.Proficiency with at least one dynamic malware analysis tool.Working knowledge of common malware families and common adversary tactics, techniques, and procedures (e.g. MITRE ATT&CK).General knowledge of Windows, Linux or MacOS operating system internals.Desired Skills:Bachelor's degree or equivalent IT work experience.A strong candidate will have the GIAC Reverse Engineering Malware Certification (GREM) or similar.A strong candidate would also have the book “Practical Malware Analysis” by Sikorski and Honig be on their bookshelf.Familiarity with a scripting language like bash or PowerShell.One or more baseline cybersecurity certifications like SEC+, CEH, GCFA, GCFE, GNFA, or OSCP Certifications.Join the Kaseya growth rocket ship and see how we are #ChangingLives!Additional informationKaseya provides equal employment opportunity to all employees and applicants without regard to race, religion, age, ancestry, gender, sex, sexual orientation, national origin, citizenship status, physical or mental disability, veteran status, marital status, or any other characteristic protected by applicable law.
#J-18808-Ljbffr