Roles within Information Security may cover one or more areas of speciality, e.g. Identity & Access Management (which may include, for example, authentication; access management & control; recertification etc.); Information Security (“IS”) Operations (which may for example include, cyber threat operations; cyber forensics, protection against data leakage etc.) and IS Technology (which may include IS architecture, IS engineering, cryptographic services etc.)
Details of the Division and Team:
Everyday DB observes thousands of intrusion attempts. Integrated in Deutsche Bank’s Chief Security Office (CSO), the Information Security Operations team is responsible for mitigating these risks. The Information Security Operations team enables the business of Deutsche Bank by providing agile security operational capabilities. The teams: Cyber Threat Operations, Malware Response & Cyber Forensics, Incident Response, and Vulnerability Management provide global services from key locations in Frankfurt, Jacksonville and Singapore.
What we will offer you:
A healthy, engaged and well-supported workforce are better equipped to do their best work and, more importantly, enjoy their lives inside and outside the workplace. That’s why we are committed to providing an environment with your development and wellbeing at its center.
You can expect:
- Flexible benefits plan including virtual doctor consultation services
- Comprehensive leave benefits
- Gender Neutral Parental Leave
- Flexible working arrangements
- 25 days Annual leave, plus public holiday & Flexible Working Arrangement
Your key responsibilities:
As the Malware Analyst will work closely in a team of subject-matter experts from different areas, excellent communication skills are required for this position.
Roles and Responsibilities overview:
- Dissect and analyze artifacts from potentially compromised Bank systems with the help of static and dynamic analysis solutions.
- Identify infection vectors as well as respective possibilities for remediation, and correlate findings with network and application log files if required.
- Support the Security Operations Centre and other groups within CSO – Information Security Operations during ongoing incidents and investigations, and advise stakeholders with respect to available remediation actions.
Your skills and experience:
- Expert knowledge in the field of IT security, incident response, and/or computer forensics.
- Strong knowledge of common software vulnerabilities, attack vectors, and exploitation methods.
- Good knowledge of common network protocols, in particular on the application layer.
- Capability of or strong interest in automating analysis tasks in a short amount of time, e.g., with scripting languages such as Python or PowerShell.
- Familiarity with common software disassemblers and debuggers, e.g., IDA Pro, OllyDbg, or Immunity Debugger.
- Knowledge of Microsoft Windows and Linux operating system internals is considered a significant plus.
- Knowledge of penetration testing techniques is considered a plus.
- Capability of explaining the implications of modern threats to both technical and potentially non-technical parties.
- Self-motivated, strong team player, and interested in learning.
Desired Education & Certifications:
- Degree from a four-year university with a focus on IT security or computer forensics or major course work in related fields of study.
- GIAC Reverse Engineering Malware (GREM) or related certifications.
How we’ll support you:
- Training and development to help you excel in your career
- Flexible working to assist you balance your personal priorities
- Coaching and support from experts in your team
- A culture of continuous learning to aid progression
- A range of flexible benefits that you can tailor to suit your needs