- ABBTECH Professional Resources, Inc. (Washington, DC)
- …Kit [FTK], Foremost). + Collect and analyze intrusion artifacts (eg, source code, malware , and system configuration) and use discovered data to enable mitigation of ... Sleuthkit, FTK). + Ability to perform deep analysis of captured malicious code (eg, malware forensics). + Skill in analyzing anomalous code as malicious or benign. +… more
- CACI International (St. Louis, MO)
- …certification within 120 days of start date. CSOC Tier 2 Services include malware and implant analysis, and forensic artifact handling and analysis. While not in ... of start date. CSOC Tier 3 Services include incident handling/incident response, malware and analysis and signature development, and forensic artifact handling and… more
- Cipher Tech Solutions (Linthicum Heights, MD)
- …tools which directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and processing ... federal and military law enforcement, counterintelligence, and counter terrorist activities. Malware reverse engineering is the practice of analyzing malicious code.… more
- General Dynamics Information Technology (Bossier City, LA)
- …determination of false alarms, insider threat and APT detection, and malware analysis/forensics + Supports the production and maintenance standard operational ... of information systems, vulnerability remediation, intrusion detection, log reviews, and malware tracking + Assess, identify, and remediate of the individuals and/or… more
- Tyto Athene (Ashburn, VA)
- …of adversarial activity + Utilize advanced tools, such as digital forensics or malware analysis capabilities, to identify incidents' root causes, scope, and impact + ... + GCFE - GIAC Certified Forensic Examiner + GREM - GIAC Reverse Engineering Malware + GNFA - GIAC Network Forensic Analyst **Clearance:** + TS/SCI Clearance required… more
- Cipher Tech Solutions (Vienna, VA)
- …tools which directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and processing ... federal and military law enforcement, counterintelligence, and counter terrorist activities. Malware reverse engineering is the practice of analyzing malicious code.… more
- Cipher Tech Solutions (Vienna, VA)
- …tools which directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and processing ... federal and military law enforcement, counterintelligence, and counter terrorist activities. Malware reverse engineering is the practice of analyzing malicious code.… more
- Amazon (Arlington, VA)
- …Engineers respond to security events, conduct analysis of threats such as malware and intrusion attempts, and provide security services to safeguard highly sensitive ... and deep technical knowledge, specifically in the fields of forensics, malware analysis, network security, application security, threat hunting, and threat… more
- PenFed Credit Union (Mclean, VA)
- …proper incident investigations and resolution. + Strong filesystem and malware behavioral knowledge. Experience building a forensics capability. Strong experience ... with forensics tools for incident response. + Knowledge of the Cyber threat landscape and APT groups. + Knowledge of the MITRE ATT&CK Framework and ability to identify incident types and attack lifecycle + Knowledge of change management process and experience… more
- The MITRE Corporation (Bedford, MA)
- …Safety + Crypto and Trust + Cyber Adversary Emulation + Cyber Analytics and Malware + Cyber Assessments + Cyber Deception and Adversary Engagement + Cyber Effects ... and Reverse Engineering + Cyber Forensics + Cyber Resiliency + Cyber Safety + Cyber Strategy and Governance + Cyber Supply Chain + Cyber Threat Intelligence + Defensive Cyber Operations + Enterprise Security Architecture + Identity, Credentialing, and Access… more