Posted today
Top Secret/SCI
$171,000 - $228,000
Full Scope Polygraph
IT - Security
Fort Meade, MD (On-Site/Office)
Job Description
SALARY RANGE $171,000 - $228,000/year.
DUTIES As a successful candidate for the Malware Analyst II, you will support clients in solving difficult problems by providing recommendations based on the results of malicious code analysis. Analyze and evaluate malicious code to create technical reports for indicators of compromise and to recommend mitigation and detection actions. Work to continually improve current malware analysis techniques and identify new ways to improve malware identification best practices. Conduct research and training on comprehending emerging malicious code threats.
Required Skills
SKILLS
QUALIFICATIONS Candidate must possess five (5) years of relevant, demonstrated experience. Three (3) years of demonstrated experience with malware analysis. Two (2) years of demonstrated experience with tools such as GHIDRA, SYSInternals, FireEye AX, or similar technologies. One (1) year of demonstrated experience with the development of code in languages such as Python, Lua, C/C++, Ruby, or similar.
CERTIFICATIONS & TECHNICAL PROFICIENCIES Requires DoD 8570 compliance with CSSP Analyst baseline certification. Information Assurance Technical (IAT) Level I (possess one: A+ CE, CCNA-Security, CND, Network+ CE, SSCP) or Level II (possess one: CCNA Security, CySA+, GICSP, GSEC, Security+ CE, CND, SSCP) certification. Computing Environment (CE) certification requirements can be fulfilled with either Microsoft OS, Cent OS/Red Hat OS CE certifications. Requires Global Information Assurance Certification (GIAC) Certified Forensic Analyst (GCFA) certificate or Certified Reverse Engineering Malware (GREM) certificate. Requires successful completion of the Splunk software training course "Fundamentals 1".
SALARY RANGE $171,000 - $228,000/year.
DUTIES As a successful candidate for the Malware Analyst II, you will support clients in solving difficult problems by providing recommendations based on the results of malicious code analysis. Analyze and evaluate malicious code to create technical reports for indicators of compromise and to recommend mitigation and detection actions. Work to continually improve current malware analysis techniques and identify new ways to improve malware identification best practices. Conduct research and training on comprehending emerging malicious code threats.
Required Skills
SKILLS
- Conduct both dynamic and static analysis of suspicious code in order to establish malicious capability and determine potential impact
- Experience with host and network monitoring for analysis of malware execution & propagation methodologies
- Perform analysis on captured data, such as audit, log, network traffic, et cetera, to identify any intrusion-related artifacts
- Understanding of operating system-specific exploitation vectors
- Analyze malicious code by employing tools, scripting languages, and leveraging virtual machines/environments
- Support 24/7 monitoring of malware threats to networks, hosts, mission platforms, and boundaries
- Generate documentation of vulnerabilities and exploits used by malware in written reports
- Communicate written and verbal information in a timely, clear, and concise manner
- Apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)
- Generate a technical summary of findings in accordance with established reporting procedures
- Develop and recommend mitigation strategies
- Develop signatures, techniques, and rules to identify malware vectors
- Collaborate with internal and external organizations to evaluate emerging threats
- Correlate data from multiple sources to identify probable threat actors
QUALIFICATIONS Candidate must possess five (5) years of relevant, demonstrated experience. Three (3) years of demonstrated experience with malware analysis. Two (2) years of demonstrated experience with tools such as GHIDRA, SYSInternals, FireEye AX, or similar technologies. One (1) year of demonstrated experience with the development of code in languages such as Python, Lua, C/C++, Ruby, or similar.
CERTIFICATIONS & TECHNICAL PROFICIENCIES Requires DoD 8570 compliance with CSSP Analyst baseline certification. Information Assurance Technical (IAT) Level I (possess one: A+ CE, CCNA-Security, CND, Network+ CE, SSCP) or Level II (possess one: CCNA Security, CySA+, GICSP, GSEC, Security+ CE, CND, SSCP) certification. Computing Environment (CE) certification requirements can be fulfilled with either Microsoft OS, Cent OS/Red Hat OS CE certifications. Requires Global Information Assurance Certification (GIAC) Certified Forensic Analyst (GCFA) certificate or Certified Reverse Engineering Malware (GREM) certificate. Requires successful completion of the Splunk software training course "Fundamentals 1".
group id: 91130336