Peraton
Cyber Malware Analyst
Peraton, Beltsville, Maryland, United States, 20705
Peraton
Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated solutions and technologies to protect our nation and allies. Peraton is currently seeking a
Cyber Malware Analyst
to become part of Peraton’s Department of State (DoS) Diplomatic Security Cyber Mission (DSCM) program providing leading cyber and technology security experience to enable innovative, effective, and secure business processes. You will be a part of the Cyber Incident Response Team. Location:
Beltsville, MD. Required:
On-site work for the first 90 days. After the 90-day period, a hybrid schedule may be offered. This position will support Monday – Friday / Shift 1 / from 6:00am to 2:00pm. In this role, you will: Provide malware analysis support in a 24x7x365 environment. Conduct advanced analysis and recommend remediation steps for cyber security events and incidents. Respond to and assist with the resolution of any suspected or successful cyber security breach or violation. Share knowledge and intelligence gained from cyber security events with stakeholders. Protect against and prevent potential cyber security threats and vulnerabilities. Implement and utilize cyber security frameworks (e.g., MITRE-ATT&CK, Kill Chain, etc.). Activities include the following: Advanced code analysis (e.g., reverse engineering of malicious code). Advanced traffic analysis (at the packet level) and reconstruction of network traffic to discover anomalies, trends, and patterns. Forensic analysis of suspected systems/digital storage devices (e.g., SSD/HDD, GFE devices, on and off premise network devices, and storage media) impacted by malicious activity. Digital media analysis (logs, code, hard drives, memory dumps, etc.) to determine attack vectors and develop mitigation techniques. Provide comprehensive findings and recommended remediation steps. Qualifications
Basic Qualifications -
To be considered for this position, you must at minimum meet the knowledge, skills, and abilities listed below: Bachelor's degree with 2 years of experience; or a Master's degree. An additional 4 years of experience can be substituted in lieu of the degree requirement. Must possess
one
of the following certifications by start date: A+ CE; CCNA-Security; CND; Network+ CE; SSCP. Ability to resolve highly complex malware and intrusion issues using computer host analysis, forensics, and reverse engineering. Ability to recommend sound countermeasures to malware and other malicious type code and applications which exploit customer communication systems. Knowledge in development of policies and procedures to investigate malware incidents for an entire computer network. Expertise in discovering, analyzing, diagnosing, and reporting on malware events, files, and network intrusion and vulnerability issues. Incident Response experience utilizing Splunk and/or Tanium/HX. Demonstrate an intermediate proficiency in debugging and disassembling x86/x64 PE files. Experience with sandboxing/virtual environments. Experience with ServiceNow or similar tool. An active Secret security clearance with the ability to obtain a final Top Secret security clearance. Preferred: Understanding of Cloud Development with Microsoft Azure/MDE. Familiarity with monitoring Cross Domain Solutions. Familiarity with Databricks. Understanding of Machine Learning and User and Entity Behavior Analytics. Experience with SOAR platform. Target Salary Range
$86,000 - $138,000. This represents the typical salary range for this position based on experience and other factors.
#J-18808-Ljbffr
Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated solutions and technologies to protect our nation and allies. Peraton is currently seeking a
Cyber Malware Analyst
to become part of Peraton’s Department of State (DoS) Diplomatic Security Cyber Mission (DSCM) program providing leading cyber and technology security experience to enable innovative, effective, and secure business processes. You will be a part of the Cyber Incident Response Team. Location:
Beltsville, MD. Required:
On-site work for the first 90 days. After the 90-day period, a hybrid schedule may be offered. This position will support Monday – Friday / Shift 1 / from 6:00am to 2:00pm. In this role, you will: Provide malware analysis support in a 24x7x365 environment. Conduct advanced analysis and recommend remediation steps for cyber security events and incidents. Respond to and assist with the resolution of any suspected or successful cyber security breach or violation. Share knowledge and intelligence gained from cyber security events with stakeholders. Protect against and prevent potential cyber security threats and vulnerabilities. Implement and utilize cyber security frameworks (e.g., MITRE-ATT&CK, Kill Chain, etc.). Activities include the following: Advanced code analysis (e.g., reverse engineering of malicious code). Advanced traffic analysis (at the packet level) and reconstruction of network traffic to discover anomalies, trends, and patterns. Forensic analysis of suspected systems/digital storage devices (e.g., SSD/HDD, GFE devices, on and off premise network devices, and storage media) impacted by malicious activity. Digital media analysis (logs, code, hard drives, memory dumps, etc.) to determine attack vectors and develop mitigation techniques. Provide comprehensive findings and recommended remediation steps. Qualifications
Basic Qualifications -
To be considered for this position, you must at minimum meet the knowledge, skills, and abilities listed below: Bachelor's degree with 2 years of experience; or a Master's degree. An additional 4 years of experience can be substituted in lieu of the degree requirement. Must possess
one
of the following certifications by start date: A+ CE; CCNA-Security; CND; Network+ CE; SSCP. Ability to resolve highly complex malware and intrusion issues using computer host analysis, forensics, and reverse engineering. Ability to recommend sound countermeasures to malware and other malicious type code and applications which exploit customer communication systems. Knowledge in development of policies and procedures to investigate malware incidents for an entire computer network. Expertise in discovering, analyzing, diagnosing, and reporting on malware events, files, and network intrusion and vulnerability issues. Incident Response experience utilizing Splunk and/or Tanium/HX. Demonstrate an intermediate proficiency in debugging and disassembling x86/x64 PE files. Experience with sandboxing/virtual environments. Experience with ServiceNow or similar tool. An active Secret security clearance with the ability to obtain a final Top Secret security clearance. Preferred: Understanding of Cloud Development with Microsoft Azure/MDE. Familiarity with monitoring Cross Domain Solutions. Familiarity with Databricks. Understanding of Machine Learning and User and Entity Behavior Analytics. Experience with SOAR platform. Target Salary Range
$86,000 - $138,000. This represents the typical salary range for this position based on experience and other factors.
#J-18808-Ljbffr