- Leidos (Ashburn, VA)
- …situational awareness. + Analyze host, network, and application logs in addition to malware and code. + Will be responsible for developing scripts to support cyber ... minimum of 8 years of professional experience in incident detection and response, malware analysis, cyber threat hunting, or cyber forensics. + Have 2+ years recent… more
- UIC Government Services and the Bowhead Family of Companies (Dahlgren, VA)
- …in securing network communications. + Skill in protecting a network against malware . (eg, NIPS, anti- malware , restrict/prevent external devices, spam filters). + ... Skill in troubleshooting and diagnosing cyber defense infrastructure anomalies and work through resolution. + Skill in performing impact/risk assessments. + Skill to develop insights about the context of an organization's threat environment + Skill to apply… more
- Cipher Tech Solutions (Vienna, VA)
- …tools which directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and processing ... federal and military law enforcement, counterintelligence, and counter terrorist activities. Malware reverse engineering is the practice of analyzing malicious code.… more
- Leidos (Ashburn, VA)
- …of experience be in the areas of incident detection and response, remediation, malware analysis, or computer forensics. + Ability to prioritize and complete multiple ... Prior relevant experience should be in the areas of incident detection and response, malware analysis, or computer forensics. + Ability to script in one more of the… more
- Cipher Tech Solutions (Vienna, VA)
- …tools which directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and processing ... federal and military law enforcement, counterintelligence, and counter terrorist activities. Malware reverse engineering is the practice of analyzing malicious code.… more
- Leidos (Arlington, VA)
- …incidents detected by CrowdStrike. + Threat Hunting: Perform threat hunting, conduct malware analysis, and help refine detection logic in collaboration with the SOC. ... detection agent up to 4K devices. + Reduce risk by ensuring coverage of malware detection for in-scope CrowdStrike EDR Agent capable devices. + Optimization of EDR… more
- CACI International (Springfield, VA)
- …IP blocks, domain blocks, and disabling user accounts. + Perform advanced malware and implant analysis, and forensic artifact handling and analysis. + Collaborate ... and identify indicators of compromise and provide adversary attribution. + Perform malware analysis and signature development. + Coordinate with CSOC Tier 1 and… more
- General Dynamics Information Technology (Fort Belvoir, VA)
- …analysis, defensive cyber operations, or offensive cyber operations. Malware development, analysis, binary disassembly, binary decomplication, network/communication ... (OSEE), Exploit Researcher and Advanced Penetration Tester (GXPN), Reverse Engineering Malware (GREM) + Security Clearance Level: TS/SCI + US Citizenship Required… more
- Cipher Tech Solutions (Vienna, VA)
- …tools which directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and processing ... and military law enforcement, counterintelligence , and counter terrorist activities. Malware reverse engineering is the practice of analyzing malicious code. The… more
- CACI International (Springfield, VA)
- …certification within 120 days of start date. CSOC Tier 2 Services include malware and implant analysis, and forensic artifact handling and analysis. While not in ... of start date. CSOC Tier 3 Services include incident handling/incident response, malware and analysis and signature development, and forensic artifact handling and… more