Please scroll down, To apply

Cyber Malware Reverse Engineer (Shift Work) with Security Clearance

hiring now
New job

Recruiters Workforce

2024-09-20 22:46:42

Job location Reston, Virginia, United States

Job type: fulltime

Job industry: I.T. & Communications

Job description

About the Opportunity: On behalf of our client, we are currently seeking an experienced Cyber Security Analyst with advanced knowledge in applying analytics in support of enterprise network cyber defense capabilities to prevent sophisticated cyber threats and vulnerabilities, or detection of them when prevention fails. The successful candidate will be responsible for strengthening the defensive posture and cyber defense operational readiness of an IT Enterprise, our Enterprise Cyber Network Defense Operations (ECNDO) program defends and protects Government assets from external cyber attacks and insider threats that can potentially cause or create data, systems, networks, and personnel vulnerabilities. Day and Swing shift schedule available Required Clearance: AN ACTIVE DEPARTMENT OF DEFENSE TS/SCI SECURITY CLEARANCE IS REQUIRED IN ORDER TO APPLY.
Willingness to submit to and pass a Counter Intelligence (CI) Polygraph. Location: Reston, VA Schedule: Day Shift: 6am - 2:30pm
Swing Shift: 2pm - 10:30pm Functional Duties: Expertise in reverse engineering malware, and familiarity with today's tools and operational needs.
Ability to identify vulnerabilities in software and hardware, analyze and reverse engineer software and hardware systems Attention to detail and ability to work with team-members and independently. Must have common knowledge of standard network infrastructure. Familiar with monitoring emerging threats through Tools, Techniques, and Procedures (TTPs) and how they relate to the MITRE ATT&CK Framework Knowledge of debuggers and disassemblers and familiar with linkers and loaders Knowledge of domain masquerading, certificates, and file hashing. Strong written communications skills are necessary to properly document and report the malware. Outstanding problem-solving skills are essential while work closely with other areas of the security team to identify appropriate solutions. Must be passionate about technology, and able to learn the ropes of new security solutions rapidly.
Recognize common behavior patterns that are primarily found in malware. Indicators of Compromise (IOC)s will be obtained through: forensic analysis of digital information, Open-Source Intel (OSINT) review/monitoring; using available tools, both customer provided and open source; and pivoting/researching on previously reported IOCs. Participate in collaborative sessions with other CND Service Providers and IC agencies on malicious intrusions, attacks or suspicious activities, as well as share emerging Cyber Threat Intel data. Assist in the development of IOCs for active defensive countermeasures and passive detection signatures.
Education and Experience: Must be an IT-related degree. HS/GED + 16 years experience
Associates Degree + 14 years experience
Bachelor's Degree + 12 years experience
Master's Degree + 10 years experience
PhD + 8 years experience Required Certifications: 8750 IAT Level II: One of the following certifications is required: Security+CE, CySA+, GICSP, GSEC, CND, or SSCP 8570 Specialty: CSSP Analyst; One of the following certifications is required: CEH, CFR, CCNA Cyber Ops, CySA+, GCIA, GCIH, GICSP, Cloud+, SCYBER, PenTest+ GIAC: GIAC Reverse Engineering Malware (GREM)

Inform a friend!

<!– job description page –>
Top