- CACI International (Chantilly, VA)
- …such as OSCP, OSCE, GPEN, GWAPT, GPEN, GXPN, CEH, CISSP.** ** Malware analysis or digital computer forensics experience.** **Cyber related Law Enforcement ... or Counterintelligence experience.** **Scripting (Windows/*nix), Bash, Python, Perl or Ruby, Systems Programming is a plus.** **Existing Subject Matter Expert of Advanced Persistent Threats and Emerging Threats.** **Proactive interest in emerging technologies… more
- CoStar Realty Information, Inc. (Arlington, VA)
- …collection, enrichment, andprocessing. + Conductdetailed researchonthreat actors, campaigns, malware , and TTPs using frameworks such as MITRE ATT&CKtoidentifyrisk ... and threats specific to the business. + Partnerand collaboratewith cross-functional teams to embed intelligence intoall aspects of securityengineering, risk assessments, andbusinesstechnology/architecturedecisionmaking processes. + Train and guide… more
- The MITRE Corporation (Mclean, VA)
- …Safety + Crypto and Trust + Cyber Adversary Emulation + Cyber Analytics and Malware + Cyber Assessments + Cyber Deception and Adversary Engagement + Cyber Effects ... and Reverse Engineering + Cyber Forensics + Cyber Resiliency + Cyber Safety + Cyber Strategy and Governance + Cyber Supply Chain + Cyber Threat Intelligence + Defensive Cyber Operations + Enterprise Security Architecture + Identity, Credentialing, and Access… more
- GCyber (Arlington, VA)
- …& Maintenance - Implement and maintain security measures, antivirus/ malware protection, security patch distribution, vulnerability scanning, and compliance ... with STIG requirements. + Incident Management & Readiness Support - Provide onsite incident management, support scheduled CCRIs and SAVs, and ensure continuous cybersecurity readiness for NIPRNET, SIPRNET, JWICS, and SAP systems. + Customer Support &… more
- ManTech (Ashburn, VA)
- …certifications: GIAC Certified Threat Intelligence (GCTI), GIAC Reverse Engineering Malware (GREM) or GIAC Certified Intrusion Analyst (GCIA). **Clearance ... Requirements:** + Must have a current/ active TS/SCI clearance. + Must be able to obtain and maintain a CBP BI (Background Investigation) **Physical Requirements:** + Must be able to be in a stationary position more than 50% of the time + Must be able to… more
- ManTech (Ashburn, VA)
- …solutions, and other applicable tools. + Assisting with conducting malware analysis and performing static/dynamic file analysis. **Minimum Qualifications:** + ... Bachelor's degree in computer science, engineering, information technology, or cybersecurity. + Certified Information System Security Professional (CISSP) and at least one of the following: SANS GIAC Certified Intrusion Analyst (GCIA), SANS GIAC Certified… more
- Kratos Defense & Security Solutions, Inc. (Herndon, VA)
- …areas in analytics, knowledge management, information access/management and cyber/threat ( malware ) analysis + Design, implement, and test complex algorithms ... requiring strict timing, following the software development, configuration management, testing, and validation processes, and ensure quality is built into the product + Utilize scientific analysis and mathematical modeling to predict performance and… more
- Leidos (Alexandria, VA)
- …HIPS/HBSS, IDS/IPS, Full Packet Capture, Network Forensics. + Experience with malware analysis concepts and methods. + Unix/Linux command line experience. + ... Scripting and programming experience. + Motivated self-starter with strong written and verbal communication skills, and the ability to create complex technical reports on analytic findings. + Familiarity or experience in Intelligence Driven Defense, Cyber Kill… more
- Nightwing (Falls Church, VA)
- …of Security operations engineers investigating alerts, anomalies, errors, intrusions, malware , etc. to identify the responsible, determine remediation, and recommend ... security improvements + Follows precise analytical paths to determine the nature and extent of problems being reported by tools, e-mails, etc + Follows strict guidance on reporting requirements + Keeps management informed with precise, unvarnished information… more
- Oracle (Richmond, VA)
- …a tenancy. Software assurance includes measures to prevent the deployment of malware or vulnerable, malicious, or unauthorized code into the application's tenancy. ... It also includes monitoring the flow of data in and out of the application's tenancy to prevent unauthorized exfiltration of data. The software gateway services will intercept web traffic, operator actions, and CI/CD pipelines to perform a set of assurance… more
Recent Jobs
-
Lead Mechanical Engineer 1 - Nuclear
- Sargent & Lundy (Cedar Rapids, IA)