- KBR (Arlington, VA)
- …vulnerability analysis, SIEM operations, cyber network defense, cyber operations, malware analysis, information systems security management, or engineering. * ... Proficiency with Xacta or eMASS. * Experience with DoD Joint Special Access Program Implementation Guide (JSIG), AF Cyber policies, NIST SP 800 Series, and CNSSI 1253 security controls and overlays. * Experience operating in cloud cybersecurity and shared… more
- CACI International (Chantilly, VA)
- …such as OSCP, OSCE, GPEN, GWAPT, GPEN, GXPN, CEH, CISSP.** ** Malware analysis or digital computer forensics experience.** **Cyber related Law Enforcement ... or Counterintelligence experience.** **Scripting (Windows/*nix), Bash, Python, Perl or Ruby, Systems Programming is a plus.** **Existing Subject Matter Expert of Advanced Persistent Threats and Emerging Threats.** **Proactive interest in emerging technologies… more
- Kratos Defense & Security Solutions, Inc. (Herndon, VA)
- …areas in analytics, knowledge management, information access/management and cyber/threat ( malware ) analysis + Design, implement, and test complex algorithms ... requiring strict timing, following the software development, configuration management, testing, and validation processes, and ensure quality is built into the product + Utilize scientific analysis and mathematical modeling to predict performance and… more
- Shuvel Digital (Reston, VA)
- …Working knowledge of cyber operations, cyber defense strategies and tools, and malware + Working knowledge of networks, network traffic data, and virtual ... environments. + Experience with network traffic inspection tools (eg, Suricata, Arkime, Zeek, etc.). + Knowledge of big data technologies, (eg, Elastic Search, Apache Hadoop, Spark, Kafka, etc.). Relevant Certifications: + Certifications in Cloud Engineering,… more
- Nightwing (Falls Church, VA)
- …of Security operations engineers investigating alerts, anomalies, errors, intrusions, malware , etc. to identify the responsible, determine remediation, and recommend ... security improvements + Follows precise analytical paths to determine the nature and extent of problems being reported by tools, e-mails, etc + Follows strict guidance on reporting requirements + Keeps management informed with precise, unvarnished information… more
- Shuvel Digital (Herndon, VA)
- …monitoring and response + Log management, IDS/IPS, SIEM, firewall technologies + Malware analysis and antivirus systems + VPN technologies and encryption standards + ... Strong knowledge of FISMA, NIST controls, and DHS cybersecurity guidelines + Proficient in developing team schedules, operational SOPs, and executive reporting + Bachelor's or Master's in Information Technology (or related field) OR equivalent hands-on… more
- D&G Support Services, LLC (Fort Belvoir, VA)
- …storage and security records + Stays up to date on the newest viruses and malware being used by cybercriminals + Aids in the development and implementation of best ... practices that employees can follow to reduce the risk of data theft + Installs and maintains antivirus software and systems + Responds to data threats to limit data loss and retakes control of the system + Writes reports outlining the findings of diagnostic… more
- ManTech (Herndon, VA)
- …protocols, system logs, and security event correlation. + Experience in analyzing malware , attack vectors, and threat actor TTPs. **Preferred Qualifications:** + A ... master's degree + Experience working in a government or defense environment. + Familiarity with DHS policies and procedures. + Knowledge of broader cybersecurity frameworks (eg, NIST, ISO 27001). **Clearance Requirements:** + Must have a current/active Secret… more
- TekSynap (Ashburn, VA)
- …the identification of advanced cyber threat activities, intrusion detection, malware identification, and security content development (eg, signatures, rules, etc.) ... + Experience interpreting scripts to support cyber threat detection in a variety of formats, such as VB scripts, Python, C++, and HTML, XML or other types needed for analysis. + Experience in conducting cyber threat hunt analysis, utilizing cyber threat… more
- Guidehouse (Reston, VA)
- …written reports on compliance and associated risks + Validating specific events (ie, malware detection alerts) for use in polling other security systems to ensure ... events are captured + Coordination with the purple team and cyber threat emulation activities **What You Will Need** **:** + An ACTIVE and MAINTAINED TS/SCI Federal or DoD security clearance with a COUNTERINTELLIGENCE (CI) polygraph + Bachelor's degree + EIGHT… more