Incident Response Malware Analyst / Active TS/SCI
Quantico, VA, United States
Full Time Entry-level / Junior Clearance required USD 86K - 138K
Peraton
Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly...Responsibilities
Peraton is growing our team of highly motivated professionals supporting a critical and exciting mission.
We are seeking multiple experienced Incident Response Malware Analysts to support MCCOG DCO cyber incident investigations of suspected malicious software through static and dynamic analysis and other means.
Location: Quantico, VA; flexible for some remote/telework.
In this role, you will...
- Perform technical analysis of malicious binaries through controlled execution and/or static analysis of assembly code, overcoming techniques designed to defeat analysis; to ascertain functionality, capability, call-backs, assist with attribution to adversary infrastructure, and identification of indicators of compromise.
- Develop tools and cloud infrastructure for parsing and organizing mission data.
- You may also write and produce high quality technical reports related to the scope, nature, and characteristics of malicious software suitable for distribution to both technical and non-technical audiences.
- Develop attack platform configuration scripts enabling cloud SIEM communication agnostic to operating system or changing mission status.
Qualifications
Basic Qualifications:
- 2 years with BS/BA; 0 years with MS/MA; 6 years with no degree
- Demonstrated experience with cyber defense tools, tactics, and techniques in a large enterprise environment.
- At least 2 years of experience performing malware analysis.
- Current DoD 8570 IAT Level III certification.
- US citizenship required.
- Active TS/SCI.
Desired Qualifications:
- GIAC Reverse Engineering Malware (GREM) or equivalent industry certification.
- Experience with malware analysis using static and dynamic analysis tools, including disassemblers, debuggers,and virtual machines.
- Experience handling national state level intrusions
- Experience with monitoring threats through Tools, Techniques, and Procedures and how they relate to the MITRE ATT&CK framework.
- Experience with Windows internals such as the Windows Application Interface (APIs), processes, threads, and the registry.
- Experience with Linux and comfortable traversing the terminal.
- Knowledge of common attacker methodologies and exploit techniques.
- Knowledge of network protocols and networking concepts.
- Knowledge of x86 and x64 instruction set architectures.
- Ability to analyze shellcode, packed, and obfuscated code.
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world safe and secure.
Target Salary Range
$86,000 - $138,000. This represents the typical salary range for this position based on experience and other factors.Tags: APIs Cloud Cyber defense DCO DoD DoDD 8570 Exploit GIAC GREM Incident response Linux Malware MITRE ATT&CK Monitoring Reverse engineering SIEM TS/SCI Windows
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Officer jobs
- Open Information Security Specialist jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Senior Cyber Security Engineer jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Cyber Security Architect jobs
- Open Cyber Security Specialist jobs
- Open Product Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Chief Information Security Officer jobs
- Open Cybersecurity Analyst jobs
- Open Staff Security Engineer jobs
- Open Security Specialist jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Senior Information Security Analyst jobs
- Open Consultant SOC / CERT H/F jobs
- Open Senior Information Security Engineer jobs
- Open Cybersecurity Consultant jobs
- Open Senior Penetration Tester jobs
- Open IT Security Analyst jobs
- Open Security Researcher jobs
- Open Security Operations Analyst jobs
- Open Cybersecurity Specialist jobs
- Open Sr. Security Engineer jobs
- Open IT Security Engineer jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open Pentesting-related jobs
- Open ISO 27001-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open SaaS-related jobs
- Open Security assessment-related jobs
- Open APIs-related jobs
- Open Malware-related jobs
- Open Java-related jobs
- Open Forensics-related jobs
- Open Security Clearance-related jobs
- Open DevOps-related jobs
- Open CEH-related jobs
- Open IDS-related jobs
- Open EDR-related jobs
- Open Kubernetes-related jobs