- Cipher Tech Solutions (Vienna, VA)
- …tools which directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and processing ... federal and military law enforcement, counterintelligence, and counter terrorist activities. Malware reverse engineering is the practice of analyzing malicious code.… more
- ManTech (Herndon, VA)
- …long-term and time-sensitive in-depth technical analysis of malicious code ( malware ), developing defensive countermeasures, and producing reports for dissemination. ... implement, enhance, or change existing use cases; assess scope of malware campaigns and determine necessary remediation actions; conduct remote compromise… more
- CACI International (Springfield, VA)
- …certification within 120 days of start date. CSOC Tier 2 Services include malware and implant analysis, and forensic artifact handling and analysis. While not in ... of start date. CSOC Tier 3 Services include incident handling/incident response, malware and analysis and signature development, and forensic artifact handling and… more
- Nightwing (Sterling, VA)
- …this critical customer mission. Responsibilities: - Acquire/collect computer artifacts (eg, malware , user activity, link files) in support of onsite engagements - ... Triage electronic devices and assess evidentiary value - Correlate forensic findings to network events in support of developing an intrusion narrative - Collect and document system state information (eg running processes, network connections) prior to imaging,… more
- Google (VA)
- …or equivalent practical experience. + 5 years of experience in SOC analyst, malware research, threat hunting, or similar roles, working with EDR and SIEM ... technologies. + Experience participating in incident response activities. **Preferred qualifications:** + Certification in one or more of the following: CompTIA Security+; CompTIA Network+; ISC2 (CISSP); SANS-GIAC certification (GSEC, GCIH, GCED, GCFA, GCIA,… more
- Amentum (Falls Church, VA)
- …cyber defense policies. + Ensure discovered cyber incidents, including misuse, virus/ malware , penetrations, and data spills are reported per standard operating ... procedures (SOP); support investigations and remediation/clean up as necessary, and provide guidance in coordination with program security management and other groups as appropriate. Provide Cyber Incident Summary Report (CISR) within 24 hours of completing… more
- CACI International (Quantico, VA)
- …forensics methodology and tools (eg, EnCase, FTK, Magnet Axiom), and memory and/or malware analyses. The Mid-Level CI SME - ICDC contractor must have the one ... of the following certifications, or an equivalent certification: DoD Windows Forensics Examiner or DoD Certified Computer Crime Investigator. - ** ** **What You Can Expect:** **A culture of integrity.** At CACI, we place character and innovation at the center… more
- TestPros (Sterling, VA)
- …monitoring systems + Scanning and vulnerability management systems + Advanced Malware Protection + Threat Intelligence + Incident Management - analysis, detection, ... and handling of security events + Penetration testing and associated tools (eg, nmap, Metasploit, etc.) + Bachelor's Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training, or work… more
- Old Dominion University (Norfolk, VA)
- …Active Directory, Group Policy or MDM policy - Enterprise-level anti-virus / anti- malware suites - Virtualization technologies such as Citrix, VMWare and VirtualBox ... - Remote support applications such as Microsoft Remote Desktop, Dameware, LogMeIn or Apple Remote Desktop - Familiarity with Linux distributions, software and management tools - Basic scripting in VBScript, Batch or Powershell - CompTIA A+ , Network+ or… more
- SMX (Dahlgren, VA)
- …hardening using STIG implementation + Endpoint protection administration for virus and malware scans, ensuring compliance with DoD standards + Support Navy RMF ... accreditation, auditing, continuous monitoring, and maintaining compliance with DoD/Navy security frameworks + Troubleshoot security incidents, access control issues, and system vulnerabilities + Provide technical security guidance and cybersecurity best… more