Feb. 23, 2023, 3:50 p.m. | /u/internal_logging

Computer Forensics www.reddit.com

I'm noticing when you're on the DFIR side, it's just assumed you should be able to do RE on malware. Yes there's a lot of sandboxes and such that do it quite a bit nowdays, but we've had a few pieces recently that were too big for the sandbox and it was just assumed by the bosses my team could RE it. Some of us have basic training, but that SANS training only goes so far.

Anyone else notice this? …

analyst big bosses computerforensics demand dfir engineer find forensic malware reverse reverse engineer sandbox sandboxes team yes

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Senior Software Engineer, Security

@ Niantic | Zürich, Switzerland

Consultant expert en sécurité des systèmes industriels (H/F)

@ Devoteam | Levallois-Perret, France

Cybersecurity Analyst

@ Bally's | Providence, Rhode Island, United States

Digital Trust Cyber Defense Executive

@ KPMG India | Gurgaon, Haryana, India

Program Manager - Cybersecurity Assessment Services

@ TestPros | Remote (and DMV), DC