Incident and Malware Analyst

Full Time
Boston, MA
Areas of Interest: Incident Response
report a problem


Are you looking to advance your expertise in cybersecurity, using your skill at investigating malware and attacks to improve the protection and awareness of organizations that need it?  We are a well-funded, early-stage endpoint protection company delivering the strongest, most accurate protection with a simplicity that gives us the lowest management overhead in the industry.  We’ve developed a new approach, called Responsive Machine Learning to drive protection that uniquely block exploits, fileless, and file-based attacks.

We are looking for an Incident and Malware Analyst who knows how to very quickly identify, understand, and explain malware attacks and packages when we see them.  This person will know how to follow the technical trail of malware in order to help our customers to better understand the threats we have stopped, and to help Barkly better describe the kinds of samples and test data that we deal with every day.  Maybe you’ve been doing incident response, or acting as a first-level SOC analyst.  You know how to dig into malware and attacks to see how they perform, and you’d like to help to advance the Barkly solution which is stopping attacks before they cause the harm that you are usually cleaning up.  As a member of the Research team, you will bring malware expertise and insights on newly discovered malware to key stakeholders on the product, engineering, marketing, sales, and customer success.


  • Identify, profile and reverse engineer malware software with an eye towards their behaviors and the system changes they create
  • Apply your experience and research to highlighting common areas of concern in recent events and to provide clarity around the campaigns that are identified in public reporting
  • Work closely with Customer Success, Marketing and Product teams to leverage new discoveries, and create and publish findings
  • Assist in the identification and validation of new sources of current malware, always looking to improve the breadth and depth of Barkly’s awareness
  • Stay abreast on the latest threats, vectors and tools

This is your dream job if you:

  • Have passion for cybersecurity, identifying the roots of malicious attacks and protecting victims
  • Are intellectually curious about how things work and a willingness to learn
  • Are a good communicator with strong deductive reasoning and the ability to follow issues to a single conclusion in a constrained amount of time
  • Want to learn more about the application of new techniques like automation and machine learning as components of breakthrough levels of protection
  • Thrive in a fast-paced work environments with ambitious goals and tight deadlines

Technical Requirements:

  • 2-5 years of operational malware or threat research as a primary or secondary job function in a security vendor or Fortune 1000 company
  • Familiarity with malware analysis tools such as IDA Pro,  OllyDgb, Yara, Cuckoo or sandboxing technologies
  • Knowledge of programming and scripting languages, in particular Python
  • Solid systems level understanding of Windows Operating System internals and how they are abused and subverted by malware and malicious actors
  • Fundamental understanding of attributes of binary files such as imports/exports and packers
  • Excellent ( really ) communication skills and the willingness and ability to explain complex technical topics to less technical or experienced colleagues

Bonus Points:

  • Any published research or package analysis in a security community setting
  • Experience in automating malware analysis tasks and testing
  • Exposure to threat intelligence services and content
  • Experience in analyzing and differentiating use of Windows kernel and user-space API’s
  • Familiarity with distinguishing characteristics of popular malware families, including their various naming conventions across various vendor platforms

Share this job:


Barkly is Runtime Malware Defense- a completely new approach to endpoint protection. Barkly's protection operates at runtime to provide an entirely new line of of defense that is complementary to pre-execution protection such as traditional AV and next-generation AV. Our runtime approach, which utilizes advanced machine learning, enables us to address critical threats that other solutions don't such as fileless malware and zero-days. Barkly is the first endpoint protection solution to use a multi-tenant SaaS service combined with local endpoint protection. Through this unique approach we are able to improve the strength and quality of protection in addition to the customer experience.

Visit Barkly's Social Media pages:
Company Type: Privately Held
Company Size: 11 - 50
One other job with this company: