[vox-jobs] WildList (Malicious Code) Analyst, Mechanicsburg, PA (fwd)
Ken Herron
vox-jobs@lists.lugod.org
Fri, 04 Apr 2003 13:38:55 -0800
--==========308470114==========
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
---------- Forwarded Message ----------
Date: Friday, April 04, 2003 13:18:33 -0500
From: Al Potter <apotter@icsalabs.com>
To: securityjobs@securityfocus.com
Subject: WildList (Malicious Code) Analyst, Mechanicsburg, PA
Due to our recent acquisition of the WildList, and our commitment to
support this valuable asset of the Malicious Code community, ICSA Labs
has an immediate opening for a highly qualified technical employee in
our new facility in Mechanicsburg, PA.
As a Malicious Code Analyst, you will work as a team member performing
the following duties:
- Collecting reports and samples of malicious code
- Performing disassembly and analysis of samples
- Replicating malicious code
- Summarizing results and writing reports
- Compiling and publishing the monthly WildList
Requirements:
** Must be willing to relocate to the Mechanicsburg, PA area
at own expense.
** Must already be authorized to work in the US without
restrictions, and in possession of appropriate documentation.
(** = Non-negotiable)
Technical Qualifications:
- Must have experience in disassembly and analysis of Virus, Trojan
and Worm binary code
- Must have experience writing and analyzing assembly language, C,
C++, and VB code on the Linux and MS platforms
- Experience with typical sysadmin scripting languages such as Perl,
Unix Shell, VB, etc.
- Experience with and knowledge of commercial and open security
products
- Clue, a strong work ethic and desire to learn
You will be exposed to mature and new-to-market technologies and
products, and will be expected to interact with the worlds leading
Malicious Code product developers and researchers. Duties include the
repeated installation, configuration and testing of commercial
products and operating systems, and require advanced problem solving
and troubleshooting skills.
The ability to express complex technical concepts clearly in both
written and spoken English is required. You must be able to
independently read and comprehend technical materials in order to stay
abreast of the continuously changing body of security knowledge.
ICSA Labs benefits include 25 paid days leave per year, medical /
dental / vision care, 401(k), and stock options in the TruSecure
Corporation, our parent, a pre-IPO company.
Financial assistance for relocation or visa transfer is not available
for these positions.
Please forward your resume to:
ICSA Labs
Attn: Bruce Hughes
1000 Bent Creek Boulevard, Suite 200
Mechanicsburg, PA 17050
Fax to: 717-790-8170
Email to: bhughes@icsalabs.com
---------- End Forwarded Message ----------
--
Kenneth Herron Kherron@newsguy.com 916-366-7338
--==========308470114==========
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature";
boundary="==========308477517=========="
--==========308477517==========
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Due to our recent acquisition of the WildList, and our commitment to
support this valuable asset of the Malicious Code community, ICSA Labs
has an immediate opening for a highly qualified technical employee in
our new facility in Mechanicsburg, PA.
As a Malicious Code Analyst, you will work as a team member performing
the following duties:
- Collecting reports and samples of malicious code
- Performing disassembly and analysis of samples
- Replicating malicious code
- Summarizing results and writing reports
- Compiling and publishing the monthly WildList
Requirements:
** Must be willing to relocate to the Mechanicsburg, PA area
at own expense.
** Must already be authorized to work in the US without
restrictions, and in possession of appropriate documentation.
(** = Non-negotiable)
Technical Qualifications:
- Must have experience in disassembly and analysis of Virus, Trojan
and Worm binary code
- Must have experience writing and analyzing assembly language, C,
C++, and VB code on the Linux and MS platforms
- Experience with typical sysadmin scripting languages such as Perl,
Unix Shell, VB, etc.
- Experience with and knowledge of commercial and open security
products
- Clue, a strong work ethic and desire to learn
You will be exposed to mature and new-to-market technologies and
products, and will be expected to interact with the worlds leading
Malicious Code product developers and researchers. Duties include the
repeated installation, configuration and testing of commercial
products and operating systems, and require advanced problem solving
and troubleshooting skills.
The ability to express complex technical concepts clearly in both
written and spoken English is required. You must be able to
independently read and comprehend technical materials in order to stay
abreast of the continuously changing body of security knowledge.
ICSA Labs benefits include 25 paid days leave per year, medical /
dental / vision care, 401(k), and stock options in the TruSecure
Corporation, our parent, a pre-IPO company.
Financial assistance for relocation or visa transfer is not available
for these positions.
Please forward your resume to:
ICSA Labs
Attn: Bruce Hughes
1000 Bent Creek Boulevard, Suite 200
Mechanicsburg, PA 17050
Fax to: 717-790-8170
Email to: bhughes@icsalabs.com
--==========308477517==========
Content-Type: application/pgp-signature
Content-Transfer-Encoding: 7bit
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Content-Type: text/plain; charset=us-ascii
Due to our recent acquisition of the WildList, and our commitment to
support this valuable asset of the Malicious Code community, ICSA Labs
has an immediate opening for a highly qualified technical employee in
our new facility in Mechanicsburg, PA.
As a Malicious Code Analyst, you will work as a team member performing
the following duties:
- Collecting reports and samples of malicious code
- Performing disassembly and analysis of samples
- Replicating malicious code
- Summarizing results and writing reports
- Compiling and publishing the monthly WildList
Requirements:
** Must be willing to relocate to the Mechanicsburg, PA area
at own expense.
** Must already be authorized to work in the US without
restrictions, and in possession of appropriate documentation.
(** = Non-negotiable)
Technical Qualifications:
- Must have experience in disassembly and analysis of Virus, Trojan
and Worm binary code
- Must have experience writing and analyzing assembly language, C,
C++, and VB code on the Linux and MS platforms
- Experience with typical sysadmin scripting languages such as Perl,
Unix Shell, VB, etc.
- Experience with and knowledge of commercial and open security
products
- Clue, a strong work ethic and desire to learn
You will be exposed to mature and new-to-market technologies and
products, and will be expected to interact with the worlds leading
Malicious Code product developers and researchers. Duties include the
repeated installation, configuration and testing of commercial
products and operating systems, and require advanced problem solving
and troubleshooting skills.
The ability to express complex technical concepts clearly in both
written and spoken English is required. You must be able to
independently read and comprehend technical materials in order to stay
abreast of the continuously changing body of security knowledge.
ICSA Labs benefits include 25 paid days leave per year, medical /
dental / vision care, 401(k), and stock options in the TruSecure
Corporation, our parent, a pre-IPO company.
Financial assistance for relocation or visa transfer is not available
for these positions.
Please forward your resume to:
ICSA Labs
Attn: Bruce Hughes
1000 Bent Creek Boulevard, Suite 200
Mechanicsburg, PA 17050
Fax to: 717-790-8170
Email to: bhughes@icsalabs.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Exmh version 2.4 06/23/2000
iQCVAwUBPo3MeduN3h5YyVRRAQKadwP8D2GZikO+IeXy4EeGbgU68O7L16ssgslW
41OtB/IJ9aqhVrSdzIlqG3D09RkukOREGkzdCJqIGSjHqC3xI+nUzFJNqceTm3js
/e9/Ya7wGKzMGUt1bahQ/7i4K4S6eQIVuLfny0OMtHSEwhDlJLuNFkGr2wlnNDLD
bKnONESjTqU=
=x6Gr
-----END PGP SIGNATURE-----
--==========308477517==========--
--==========308470114==========--