[vox-jobs] WildList (Malicious Code) Analyst, Mechanicsburg, PA (fwd)

Ken Herron vox-jobs@lists.lugod.org
Fri, 04 Apr 2003 13:38:55 -0800


--==========308470114==========
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

---------- Forwarded Message ----------
Date: Friday, April 04, 2003 13:18:33 -0500
From: Al Potter <apotter@icsalabs.com>
To: securityjobs@securityfocus.com
Subject: WildList (Malicious Code) Analyst, Mechanicsburg, PA


Due to our recent acquisition of the WildList, and our commitment to
support this valuable asset of the Malicious Code community, ICSA Labs
has an immediate opening for a highly qualified technical employee in
our new facility in Mechanicsburg, PA.


As a Malicious Code Analyst, you will work as a team member performing
the following duties:

	- Collecting reports and samples of malicious code
	- Performing disassembly and analysis of samples
	- Replicating malicious code
	- Summarizing results and writing reports
	- Compiling and publishing the monthly WildList

Requirements:

	** Must be willing to relocate to the Mechanicsburg, PA area
	at own expense.

	** Must already be authorized to work in the US without
	restrictions, and in possession of appropriate documentation.

	(** = Non-negotiable)

Technical Qualifications:

	- Must have experience in disassembly and analysis of Virus, Trojan
	and Worm binary code

	- Must have experience writing and analyzing assembly language, C,
	C++, and VB code on the Linux and MS platforms

	- Experience with typical sysadmin scripting languages such as Perl,
	Unix Shell, VB, etc.

	- Experience with and knowledge of commercial and open security
	products

	- Clue, a strong work ethic and desire to learn


You will be exposed to mature and new-to-market technologies and
products, and will be expected to interact with the worlds leading
Malicious Code product developers and researchers.  Duties include the
repeated installation, configuration and testing of commercial
products and operating systems, and require advanced problem solving
and troubleshooting skills.

The ability to express complex technical concepts clearly in both
written and spoken English is required. You must be able to
independently read and comprehend technical materials in order to stay
abreast of the continuously changing body of security knowledge.




ICSA Labs benefits include 25 paid days leave per year,  medical /
dental / vision care, 401(k), and stock options in the TruSecure
Corporation, our parent, a pre-IPO company.

Financial assistance for relocation or visa transfer is not available
for these positions.

Please forward your resume to:

	ICSA Labs
	Attn: Bruce Hughes
	1000 Bent Creek Boulevard, Suite 200
	Mechanicsburg, PA  17050

	Fax to:		717-790-8170
	Email to:	bhughes@icsalabs.com


---------- End Forwarded Message ----------

-- 
Kenneth Herron  Kherron@newsguy.com     916-366-7338
--==========308470114==========
Content-Type: multipart/signed; micalg=pgp-sha1;
 protocol="application/pgp-signature";
 boundary="==========308477517=========="

--==========308477517==========
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit


Due to our recent acquisition of the WildList, and our commitment to 
support this valuable asset of the Malicious Code community, ICSA Labs 
has an immediate opening for a highly qualified technical employee in 
our new facility in Mechanicsburg, PA.


As a Malicious Code Analyst, you will work as a team member performing 
the following duties:

	- Collecting reports and samples of malicious code
	- Performing disassembly and analysis of samples
	- Replicating malicious code
	- Summarizing results and writing reports
	- Compiling and publishing the monthly WildList

Requirements:

	** Must be willing to relocate to the Mechanicsburg, PA area 
	at own expense.

	** Must already be authorized to work in the US without
	restrictions, and in possession of appropriate documentation.

	(** = Non-negotiable)

Technical Qualifications:

	- Must have experience in disassembly and analysis of Virus, Trojan 
	and Worm binary code

	- Must have experience writing and analyzing assembly language, C, 
	C++, and VB code on the Linux and MS platforms

	- Experience with typical sysadmin scripting languages such as Perl, 
	Unix Shell, VB, etc.

	- Experience with and knowledge of commercial and open security 
	products

	- Clue, a strong work ethic and desire to learn


You will be exposed to mature and new-to-market technologies and 
products, and will be expected to interact with the worlds leading 
Malicious Code product developers and researchers.  Duties include the 
repeated installation, configuration and testing of commercial 
products and operating systems, and require advanced problem solving 
and troubleshooting skills.

The ability to express complex technical concepts clearly in both 
written and spoken English is required. You must be able to 
independently read and comprehend technical materials in order to stay 
abreast of the continuously changing body of security knowledge.




ICSA Labs benefits include 25 paid days leave per year,  medical / 
dental / vision care, 401(k), and stock options in the TruSecure 
Corporation, our parent, a pre-IPO company.

Financial assistance for relocation or visa transfer is not available 
for these positions.

Please forward your resume to:

	ICSA Labs
	Attn: Bruce Hughes
	1000 Bent Creek Boulevard, Suite 200
	Mechanicsburg, PA  17050

	Fax to:		717-790-8170
	Email to:	bhughes@icsalabs.com


--==========308477517==========
Content-Type: application/pgp-signature
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Content-Type: text/plain; charset=us-ascii


Due to our recent acquisition of the WildList, and our commitment to 
support this valuable asset of the Malicious Code community, ICSA Labs 
has an immediate opening for a highly qualified technical employee in 
our new facility in Mechanicsburg, PA.


As a Malicious Code Analyst, you will work as a team member performing 
the following duties:

	- Collecting reports and samples of malicious code
	- Performing disassembly and analysis of samples
	- Replicating malicious code
	- Summarizing results and writing reports
	- Compiling and publishing the monthly WildList

Requirements:

	** Must be willing to relocate to the Mechanicsburg, PA area 
	at own expense.

	** Must already be authorized to work in the US without
	restrictions, and in possession of appropriate documentation.

	(** = Non-negotiable)

Technical Qualifications:

	- Must have experience in disassembly and analysis of Virus, Trojan 
	and Worm binary code

	- Must have experience writing and analyzing assembly language, C, 
	C++, and VB code on the Linux and MS platforms

	- Experience with typical sysadmin scripting languages such as Perl, 
	Unix Shell, VB, etc.

	- Experience with and knowledge of commercial and open security 
	products

	- Clue, a strong work ethic and desire to learn


You will be exposed to mature and new-to-market technologies and 
products, and will be expected to interact with the worlds leading 
Malicious Code product developers and researchers.  Duties include the 
repeated installation, configuration and testing of commercial 
products and operating systems, and require advanced problem solving 
and troubleshooting skills.

The ability to express complex technical concepts clearly in both 
written and spoken English is required. You must be able to 
independently read and comprehend technical materials in order to stay 
abreast of the continuously changing body of security knowledge.




ICSA Labs benefits include 25 paid days leave per year,  medical / 
dental / vision care, 401(k), and stock options in the TruSecure 
Corporation, our parent, a pre-IPO company.

Financial assistance for relocation or visa transfer is not available 
for these positions.

Please forward your resume to:

	ICSA Labs
	Attn: Bruce Hughes
	1000 Bent Creek Boulevard, Suite 200
	Mechanicsburg, PA  17050

	Fax to:		717-790-8170
	Email to:	bhughes@icsalabs.com

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Exmh version 2.4 06/23/2000

iQCVAwUBPo3MeduN3h5YyVRRAQKadwP8D2GZikO+IeXy4EeGbgU68O7L16ssgslW
41OtB/IJ9aqhVrSdzIlqG3D09RkukOREGkzdCJqIGSjHqC3xI+nUzFJNqceTm3js
/e9/Ya7wGKzMGUt1bahQ/7i4K4S6eQIVuLfny0OMtHSEwhDlJLuNFkGr2wlnNDLD
bKnONESjTqU=
=x6Gr
-----END PGP SIGNATURE-----

--==========308477517==========--

--==========308470114==========--