Malware Analyst Resume Example

Love this resume?

By clicking Build Your Own Now, you agree to our Terms of Use and Privacy Policy

Jessica Claire
, , 100 Montgomery St. 10th Floor
Home: (555) 432-1000 - Cell: - - -
Professional Summary

Information Security Specialist with passion for aligning security architecture plans and processes with security standards and business goals. Extensive experience developing and testing security framework for cloud-based software. Versed in robust network defense strategies.



    Network Automation



Work History
03/2020 to Current
Malware Analyst Iboss Sc, SC,
  • Perform in-depth static analysis and reverse engineering of malware samples to extract all relevant indicators, behaviors, and capabilities.
  • Perform dynamic analysis and triage on suspected malicious samples for the purpose of confirming malicious behavior and to extract relevant indicators of compromise and other findings.
  • Assist intelligence analysts with investigating raw telemetry, potential malicious activity, and confirmed threat detections for the purpose of identifying threats, providing context, and informing decisions about detection and response.
  • Perform open and closed source research to associate malware samples and/or malicious activity to known threats.
  • Assess code similarity among known malware families as well as patterns in identified malware and detections. Assist intelligence analysts in identifying new activity clusters.
  • Perform proactive research and hunting to identify similar malware samples from open and closed source data sets.
  • Work with intelligence analysts to communicate malware analysis findings, identify overlaps and patterns between different malware samples and families, and recommend detection and response actions.
  • Supplement Intelligence Profile documents with detailed, technical context.
  • Partner with detection engineers to help contextualize and implement robust detector logic.
  • Write reports and communicate actionable insights based on analysis, both internally and externally to customers.
  • Service requests from incident handlers to provide more details about malware indicators and capabilities discovered within customer environments. Communicate directly with customers as requested.
  • Serve as a mentor and coach for other malware analysts.
03/2019 to 02/2020
Threat Researcher Vmware, Inc. Long Beach, CA,
  • Identify, monitor, assess, and counter the cyber threats posed by cybercriminals in support of a security operations center
  • Author finished intelligence products (malware analysis reports, incident reports, JIRA reports etc)
  • Verify threat-detection coverage for the entire lifecycle of a threat
  • Analysis of the Malwares/False positives reported from the customers
  • Remain up to date on current information security trends and research techniques in the industry.
  • Finding new malware, phishes, scams, and compromised web sites to proactively block and analyze
  • Identifying trends and novel tactics observed in the threat landscape
  • Assisting threat operations team in identifying and pursuing high value targets
  • Identifying research gaps on the threat operations team and proactively obtaining
  • appropriate threat intelligence
04/2018 to 03/2019
Security Analyst Cisco Systems, Inc. West Des Moines, IA,
  • Monitor computer networks for security issues and take corrective action as necessary.
  • Investigate security breaches and other cyber security incidents.
  • Install security measures and operate software to protect systems and information infrastructure,
  • Including firewalls and data encryption programs.
  • Document security breaches and assess the damage they cause.
  • Work with security team to perform tests and uncover network vulnerabilities.
  • Fix detected vulnerabilities to maintain a high-security standard.
  • Stay current on IT security trends and news.
  • Develop company-wide best practices for IT security.
  • Help colleagues install security software and understand information security management.
  • Research security enhancements and make recommendations to management.
  • Stay up-to-date on information technology trends and security standards.
  • Ability to identify and mitigate network vulnerabilities and explain how to avoid them.
  • Understanding of patch management
09/2017 to 03/2018
Junior Network Administrator Custom Computer Specialists, Inc. East Islip, NY,
  • Installs, maintains, audits and supports a secure MS Windows network environment and limited web/data application service
  • Maintains internet applications and protocols IP,TCP,HTTP, HTTPS, FTP, & SSL
  • Maintains file servers, Firewalls, network access, Security Monitoring Systems and system documentation as required
  • Interfaces with local customers and provides IT related support to quickly resolve problems
  • Analyzes and troubleshoots system anomalies to ensure optimum equipment performance
  • Performs periodic maintenance, hardware upgrades and replacement, firmware updates and system configuration changes
  • Performs scheduled tape backups on systems as required
  • Manages data backup library to include storage of tapes, disks and other magnetic media
  • Attends planning and requirements meetings with IT staff, Program Managers and customers as required
  • Prepares system for operational use and supports operational tests
  • Provides technical guidance
Expected in
Master of Science: Computer And Information Systems Security
Campbellsville University - Campbellsville, KY

By clicking Build Your Own Now, you agree to our Terms of Use and Privacy Policy

Resumes, and other information uploaded or provided by the user, are considered User Content governed by our Terms & Conditions. As such, it is not owned by us, and it is the user who retains ownership over such content.

How this resume score could be improved?

Many factors go into creating a strong resume. Here are a few tweaks that could improve the score of this resume:


Resume Strength

  • Personalization
  • Strong Summary
  • Target Job

Resume Overview

School Attended
  • Campbellsville University
Job Titles Held:
  • Malware Analyst
  • Threat Researcher
  • Security Analyst
  • Junior Network Administrator
  • Master of Science