We have an exciting opportunity for a Malware Analyst to join our Threat Intelligence team. You will be analyzing the latest malware, rootkits, ransomware and viruses to determine attack techniques, behavior and general trends in the malware ecosystem. You will be contributing directly to the development of our products and be working closely with our developers and product management teams. The successful candidate will have solid technical analysis skills and a background in identifying vulnerabilities and malicious activity. We would welcome applications from candidates with proven commercial threat intelligence experience as well as from self-taught enthusiasts with exploitation knowledge and malware analysis skills. Job Responsibilities: Locate and analyze real world malware found in the wild and describe its exploit methods, aims and identifying features Work with Bromium's developers to enhance detection techniques to demonstrate the protection provided by micro-virtualization Write and publish blog articles on novel techniques and interesting observations Work to automate the analysis and classification of incoming samples Job Requirements: Proven experience with analysis of malware on Windows platforms Capable of responding quickly to newly emerging threats and prioritize analysis appropriately Previous experience in penetration testing or exploit kits, such as Metasploit The following skills and attributes are a plus: Prior experience of IDA-pro or similar reverse engineering tools Knowledge of multiple scripting languages, such as Python and Visual Basic Experience with development of C or C++ code Familiarity with deobfuscation and investigation techniques, such as obfuscated Microsoft Office Macros or minimized JavaScript Degree in Computer Science or related field, or equivalent Company Overview: Bromium was founded in 2010 with a mission to restore trust in computing. The company’s founders have a long and deep history of innovation in virtualization and security. Inspired by the isolation principles of traditional virtualization, the Bromium team has created a game-changing technology called micro-virtualization to protect end users against advanced malware. Every task the user performs, such as opening a document or clicking on a link, is isolated in its own micro-VM, with access to just the resources required for that task, and existing just for the life of the task. Protection is thus provided through isolation, without relying on detection, hence reliably defending the user from polymorphic and even zero-day malware. Bromium was acquired by HP Inc on 19 September 2019. The role will be located at the R&D center in Cambridge, UK. For more information visit our website: http://www.bromium.com Strictly no agencies please.