Senior Malware Analyst
Peraton
- Beltsville, MD
- $112,000-179,000 per year
- Permanent
- Full-time
- Provide static and dynamic malware analysis support in a 24x7x365 environment.
- Contribute to Shift Change Document.
- Conduct advance analysis and recommend remediation steps for cybersecurity events and incidents.
- Publish after-action reports, cyber defense techniques, guidance, and incident reports.
- Respond to and assist with the resolution of any suspected or successful cybersecurity breach or violation.
- Share knowledge and intelligence gained from cybersecurity events with stakeholders.
- Assist with training junior level analysts.
- Perform analysis of network and host logs.
- Perform network searches, artifact collection and timeline analysis using a variety of EDR tools.
- Bachelors degree and 9 years of relevant experience; another 4 years relevant experience may be considered in lieu of degree.
- At least ONE of the following certifications:
- CASP+ CE; CCNA Cyber Ops; CCNA-Security; CCNP Security; CEH; CFR; CHFI; CISA; CISSP (or Associate); CISSP-ISSAP; CISSP-ISSEP; CySA+; GCED; GCFA; GCIH; SCYBER; Security + CE
- Ability to resolve highly complex malware and intrusion issues using computer host analysis, forensics, and reverse engineering.
- Ability to recommend sound counter measures to malware and other malicious type code and applications which exploit customer communication systems.
- Has knowledge in development of policies and procedures to investigate malware incidents for the entire computer network.
- Experience with Debuggers, Disassemblers, Unpacking Tools, and Binary analysis tools.
- Experience with static and dynamic malware analysis tools and techniques.
- Ability to identify remediation steps for cybersecurity events.
- Experience with Splunk and EDR tools such as Microsoft Defender for Endpoint (MDE), Tanium.
- Ability to analyze a variety of Operating System log types.
- U.S. citizenship and an active Secret security clearance and be able to obtain a final Top Secret security clearance.
- Understanding of Security Operations Center processes and workings.
- Basic knowledge of host and network forensic analysis.
- Knowledge of IOCs and APT threat actors.
- Experience with ServiceNow Ticketing Software.