- Cipher Tech Solutions (Vienna, VA)
- …tools which directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and processing ... and military law enforcement, counterintelligence , and counter terrorist activities. Malware reverse engineering is the practice of analyzing malicious code. The… more
- CACI International (Springfield, VA)
- …certification within 120 days of start date. CSOC Tier 2 Services include malware and implant analysis, and forensic artifact handling and analysis. While not in ... of start date. CSOC Tier 3 Services include incident handling/incident response, malware and analysis and signature development, and forensic artifact handling and… more
- Tyto Athene (Ashburn, VA)
- …of adversarial activity + Utilize advanced tools, such as digital forensics or malware analysis capabilities, to identify incidents' root causes, scope, and impact + ... + GCFE - GIAC Certified Forensic Examiner + GREM - GIAC Reverse Engineering Malware + GNFA - GIAC Network Forensic Analyst **Clearance:** + TS/SCI Clearance required… more
- Cipher Tech Solutions (Vienna, VA)
- …tools which directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and processing ... federal and military law enforcement, counterintelligence, and counter terrorist activities. Malware reverse engineering is the practice of analyzing malicious code.… more
- Cipher Tech Solutions (Vienna, VA)
- …tools which directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and processing ... federal and military law enforcement, counterintelligence, and counter terrorist activities. Malware reverse engineering is the practice of analyzing malicious code.… more
- Amazon (Arlington, VA)
- …Engineers respond to security events, conduct analysis of threats such as malware and intrusion attempts, and provide security services to safeguard highly sensitive ... and deep technical knowledge, specifically in the fields of forensics, malware analysis, network security, application security, threat hunting, and threat… more
- PenFed Credit Union (Mclean, VA)
- …proper incident investigations and resolution. + Strong filesystem and malware behavioral knowledge. Experience building a forensics capability. Strong experience ... with forensics tools for incident response. + Knowledge of the Cyber threat landscape and APT groups. + Knowledge of the MITRE ATT&CK Framework and ability to identify incident types and attack lifecycle + Knowledge of change management process and experience… more
- ENS Solutions (Arlington, VA)
- …management + Knowledge of key cyber threats, including nation state actors, malware or ransomware, command and control infrastructures, and mitigations + Ability to ... collaborate with the professional confidence and credibility to effectively engage and interact with technologists and leaders across the enterprise + Ability to quickly comprehend complex problems, draw logical conclusions, make sound decisions, develop… more
- ManTech (Mclean, VA)
- …and Network Detection and Response (EDR/NDR) + User Behavior Analytics (UBA) + Malware detection/prevention + Network and host forensic applications + Web and email ... gateway security technologies **Preferred Qualifications** + Strong analytical, problem solving, and communication skills + BS degree in electrical engineering, computer engineering, computer science, or closely related IT discipline + Excellent interpersonal,… more
- Nuclear Fuel Services (Lynchburg, VA)
- …XDR) + Vulnerability assessment tools for identifying and prioritizing vulnerabilities + Malware analysis and reverse engineering techniques + Proven ability to lead ... and manage security incident response efforts, including coordinating with cross-functional teams to mitigate threats and provide forensic analysis. + Strong knowledge of the MITRE ATT&CK framework and its application in real-world attack scenarios,… more