Today
Top Secret/SCI
Unspecified
Polygraph
IT - Security
central maryland, MD (On-Site/Office)
RealmOne was built on the principle that people matter first and foremost. We believe in providing a strong work/life balance by investing in our employees and encouraging professional and personal growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch industry professionals.
Join us on this journey as we execute this mission-critical contract providing high-end analytics and data science services within the REALM of cybersecurity.
Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Risk Management and Assessment, and Insider Threat Analysis, by improving, protecting, and defending our Nation's Security.
Job Description:
Join us on this journey as we execute this mission-critical contract providing high-end analytics and data science services within the REALM of cybersecurity.
Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Risk Management and Assessment, and Insider Threat Analysis, by improving, protecting, and defending our Nation's Security.
Job Description:
- Support clients in solving difficult problems by providing recommendations based on the results of malicious code analysis. Analyze and evaluate malicious code to create technical reports for indicators of compromise and to recommend mitigation and detection actions. Work to continually improve current malware analysis techniques and identify new ways to improve malware identification best practices. Conduct research and training on comprehending emerging malicious code threats.
- Conduct both dynamic and static analysis of suspicious code in order to establish malicious capability and determine potential impact.
- Experience with host and network monitoring for analysis of malware execution & propagation methodologies.
- Perform analysis on captured data, such as audit, log, network traffic, et cetera, to identify any intrusion-related artifacts.
- Understanding of operating system-specific exploitation vectors.
- Analyze malicious code by employing tools, scripting languages, and leveraging virtual machines/environments.
- Support 24/7 monitoring of malware threats to Customer networks, hosts, mission platforms, and boundaries.
- Generate documentation of vulnerabilities and exploits used by malware in written reports.
- Communicate written and verbal information in a timely, clear, and concise manner.
- Apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
- Generate technical summary of findings in accordance with established reporting procedures.
- Develop and recommend mitigation strategies.
- Develop signatures, techniques, and rules to identify malware vectors.
- Collaborate with internal and external organizations to discover new threats, develop mitigation techniques, processes, and tools which further the CSSP mission, as directed by the customer.
- Evaluate emerging threats.
- Five (5) years of demonstrated experience in cybersecurity.
- Three (3) years of demonstrated experience with malware analysis.
- Two (2) years of demonstrated experience with tools such as GHIDRA, SYSInternals, FireEye AX, or similar technologies.
- One (1) year of demonstrated experience with development of code in languages such as Python, Lua, C/C++, Ruby or similar
- No Degree Required
- Requires DoD 8570 compliance with CSSP Analyst Baseline certification.
- Information Assurance Technical (IAT) Level II or Level III certification.
- Computing Environment (CE) certification. The CE certification requirements can be fulfilled with variations of Windows, Cisco, Linux, Microsoft, Python, Red Hat, Splunk, Kibana, Advanced Cyber Defense Course, and other OS systems.
- Requires Global Information Assurances Certification (GIAC) Certified Forensic Analyst (GCFA) certificate, or Certified Reverse Engineering Malware (GREM) certificate.
- Requires successful completion of the Splunk software training course "Fundamentals 1".
group id: 91157141