Senior Malware Analyst

Senior Cybersecurity Malware Analyst/Reverse Engineer-SME - This is a unique and challenging opportunity supporting the Department of State - Technical Analysis and Special Operations Branch (TASO). TASO is a technical analysis group and is the last stop for many challenging technical security issues within the organization.
This person needs to be experienced, inquisitive and able to research new highly technical subjects. Perform triage and in-depth analysis of malicious windows software (malware), phishing emails, and other client-side exploits, to support the resolution of security incidents. Perform digital forensics on media associated with compromised hosts to assess the scope and nature of intrusions. Identify and dissect highly targeted attacks and other suspicious activity using a variety of network-based tools. Provide accurate and rapid reporting of in-depth technical analysis results in written form. Works independently and provides mentorship to junior technical staff as needed.
Identifying and analyzing software exploits and raw x86 shellcode
Using a high-level scripting/programming language to extract, de-obfuscate, or otherwise, manipulate malware-related data
Debugging both user-mode and kernel-mode software
Providing mitigation suggestions in the context of a security incident, as it relates to the technical analysis of malware or other attack artifacts
Performing independent research to better understand complex technical problems
Providing oral briefings on complex technical subjects to senior management and other non-technical audiences
Experience 5+ years with 2 or more of the following is desired:
Static Binary Analysis
Use of industry standard tools
Experience with one or more programming languages, preferably at least one high level and one low-level language. Examples include: Python, Java, C, and x86 ASM
Proficient with analysis/triage of Windows malware to obtain technical indicators
Dynamic Binary Analysis
Experience with Disassemblers and Debuggers
Proficient with analysis/triage of Windows malware to obtain technical indicators
Host Forensic Analysis
Experience with tools like EnCase, FTK, Volatility
Experience with Yara, OpenIOC, or other host-based signature development
Experience across multiple platforms (Windows, Linux, Mac, iOS, Android)
Network Forensics
Experience with log correlation utilities like SPLUNK or Elastic Search
Experience reviewing network traffic logs to identify malicious activity
Experience reviewing and hardening network configurations
Experience with Snort or other network-based signature development
Monitoring using commercial tools
BRO scripting experience is a big plus
Desired Certifications:
Desired Education:
MS or BS in Computer Engineering, Computer Science, Electrical Engineering, Information Technology, Computer Forensics or related field, or appropriate amount of direct experience to match responsibilities and qualifications
You must be clearable. You can start with a Final Secret clearance and we will process you to the TS/SCI level.
Are you a returning applicant?Previous Applicants:Email:Password:
If you do not remember your password click here.

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Senior Security Analyst/Malware Reverse Engineer
Arlington, VA FGM Inc
JSP Incident - Malware Analyst
Arlington, VA CSRA Inc.
Malware Analyst
Springfield, VA Chenega Corporation
Malware Analyst Engineer
Springfield, VA Chenega Corporation
Senior Analyst, Business Operations (Senior Fi...
Bristow, VA Aerojet Rocketdyne