Required Candidate profile
malware, ransomware, application & network layer attacks,shell, Python, and PowerShell SIEM platform (e.g., Splunk, Elastic Stack) SQL queries,Threat Hunter & Threat Intelligence AnalystKeyskills: Threat Intelligence Analysis Malware Reverse Engineering malware analysis Cyber Forensics Log Analysis threat hunting cyber threat intelligence platforms SIEM Exploit Development intelligence analysis tools IDS/IPS SOC operations