Great Sample Resume

Malware Analyst Resume

When writing a Malware Analyst Resume remember to include your relevant work history and skills according to the job you are applying for. Whether you're seeking an entry-level position or have been in your career for a few years, exposing your relevant achievements in your resume can allow you to stand out and get that job interview.

This resume example is a great representation of what a hiring manager is looking for in a Malware Analyst Resume. Feel free to use this example for reference as you create your own resume or use this easy resume builder that will guide you through every step of your building your resume in just a few minutes.

Here is the Malware Analyst Resume example:

Tyler Walker

76 Terra Cotta Street

Henning, MN 56551

(222) 252-3840

Email : [email]

Career Goal
To work with your esteemed organization as a Malware Analyst and help in achievement of organizational goals owing to my knowledge in TCP/ IP, Shell, C, C++, Java, HTTP, HTTPS and DNS.
Technical Skills
Sound knowledge of networking concepts like:

  • TCP/ IP, DNS
  • IRC, RPC

Quick and brilliant with programming languages:

  • C, C++, Java
  • Perl, Python
  • Shell

Database administration expertise using:

  • Postgres
  • MySQL

Proficient in utilizing tools:

  • Remedy, Snort
  • GFI sandbox, Netwitness
  • Splunk, VMware Fusion

Highly skillful in utilizing operating systems:

  • Microsoft server 2003
  • Windows XP/Vista/ 7/8
  • Linux, Ubuntu

Solid understanding of software tools:

  • Wireshark
  • NetXpose System level scanner
  • TCPDump

Superb in using Microsoft applications:

  • Word, Excel
  • Power Point
  • Visio, Outlook

Outstanding capabilities to:

  • Interpret and use SIEM technology
  • Evaluate malicious Microsoft and Adobe documents
Relevant Experience
Malware Analyst

CACI International Inc

January 2012 – Present

Henning, MN

  • Assisted in maintenance of security issues related to cyber systems and networks for whole enterprise.
  • Executed predictive and reactive analytical procedures to support cyber security opportunities.
  • Provided technical assistance for performance of incident responses and resolutions by coordination of resources.
  • Performed data collection and analysis of dead system data with forensic tools and techniques.
  • Implemented procedures for investigation in internal HR, legal and ethic fields by forensic knowledge.
  • Executed procedures for conducting network traffic analysis by usage of net flow, raw packet data and IDS.
  • Suggested appropriate techniques in relation to signatures, tactics and procedures against threats.
  • Generated intelligence reports for military and national clients according to customer requirements.
Malware Analyst

Lockheed Martin Corporation

November 2010 – January 2012

Hanover, MD

  • Provided technical assistance for development and maintenance of malware analysis laboratory and related procedures.
  • Suggested appropriate procedures, hardware and software components for investigation of malware incidents.
  • Assisted in development and maintenance of information security systems across multiple networks.
  • Resolved issues about malware security and risks by technical discussion in meetings and working groups.
  • Implemented processes for effective malware program in collaboration with internal personnel and external vendors.
  • Conducted investigation of malicious code for determination of damages and data infiltration.
  • Communicated to management about effective processes to purchase of hardware and software devices.
  • Performed assessments and reporting to understand SIGNIT threats and related vulnerabilities.
Educational Background
Bachelor’s Degree in Computer Information Systems

Renton Technical College

August 2006 – May 2010

Renton, WA

Professional Certification
Certified Reverse Engineering Analyst (CREA) July 2010

  • 1.0.0Version
  • 463Download
  • 1File Count
  • March 1, 2024Create Date
  • March 1, 2024Last Updated
Average Rating

4.2/5 stars with 348 reviews