- Sandia National Laboratories (Livermore, CA)
- …your role may include anything from research to software development to malware reverse engineering. About Sandia: Sandia National Laboratories is the nation's ... premier science and engineering lab for national security and technology innovation, with teams of specialists focused on cutting-edge work in a broad array of areas. Some of the main reasons we love our jobs: + Challenging work with amazing impact that… more
- Oracle (Washington, DC)
- …a tenancy. Software assurance includes measures to prevent the deployment of malware or vulnerable, malicious, or unauthorized code into the application's tenancy. ... It also includes monitoring the flow of data in and out of the application's tenancy to prevent unauthorized exfiltration of data. The software gateway services will intercept web traffic, operator actions, and CI/CD pipelines to perform a set of assurance… more
- GE HealthCare (Waukesha, WI)
- …threats. Demonstrates technical leadership abilities and strong comprehension of malware , emerging threats and calculating risk. **Job Description** **Roles and ... Responsibilities** You are a highly skilled security Engineer who enjoys security work and collaborating with product managers and developers to drive the successful adoption of innovative methods in developing secure applications. In this role, you will: *… more
- ManpowerGroup (Baltimore, MD)
- …+ Proficiency with EDR tools, Splunk, and experience with ESAs, sandboxing, and malware analysis tools. + Strong understanding of network principles and the cyber ... incident lifecycle. + Experience supporting incident response processes and coordinating with third-party vendors and internal teams. + Preferred certifications include GCIH, GSEC, GCIA, GCFE, or capture the flag experience. **What's in it for me?** +… more
- Parsons Corporation (Annapolis Junction, MD)
- …complex data sets **What Desired Skills You Might Bring** : + Malware analysis experience **Security Clearance Requirement:** An active Top Secret SCI w/Polygraph ... security clearance is required for this position. This position is part of our Federal Solutions team. The Federal Solutions segment delivers resources to our US government customers that ensure the success of missions around the globe. Our intelligent… more
- RightDirection Technology Solutions LLC (Washington, DC)
- …and client related antivirus incidents, and upgrading servers and clients; + Provide malware and virus analysis and removal; Create indicators from analysis for use ... with IDS systems to prevent and to deter future threats; Assist in conducting computer forensic operations; + Provide operational and maintenance support to Host Based Security System (HBSS) (or its replacement system), Tripwire, Nessus or Retina (or current… more
- MartinFederal Consulting, LLC (Huntsville, AL)
- …technical data within cyber threat environments + Apply forensic, network, and malware analysis techniques to identify and mitigate threats + Collaborate in ... team-based software development projects and environments + Analyze cyber threat data including reverse engineering of malicious software, network traffic analysis, memory forensics, and disk forensics + Perform static and dynamic analysis of known and unknown… more
- Minnesota State (St. Paul, MN)
- …Learning. + Ability and willingness to teach graduate-level courses such as Malware Analysis and Reverse Engineering, Secure Programming and Scripting, Cloud and IoT ... Security, Industrial Control Systems (ICS)/SCADA Security, Cellular and Wireless Security, Risk Management of AI, and Securing the AI Lifecycle. + Ability to develop and lead a successful applied research program in cutting-edge areas of Cybersecurity, Cyber… more
- Auburn University (Auburn, AL)
- …and programming languages for automation and analysis. + Ability to analyze malware behavior and low-level code execution. + Fundamental understanding of ports, ... protocols, and enterprise network/security infrastructure. + Experience with Security Information and Event Management (SIEM ) and Open-Source Intelligence (OSINT ) tools. **Cybersecurity Operations:** + Hands-on experience in incident response and security… more
- Leidos (Whitehall, OH)
- …and standard security components. + Demonstrated experience with malware analysis concepts and methodologies. + Experience implementing intelligence-driven ... defense strategies and/or utilizing the MITRE ATT&CK or Cyber Kill chain framework. + Education, Training, or Professional Certifications in Leadership, HR, or Organizational Development. (Harvard Manager Mentor, Leader as a Coach, GROW ) If you're looking for… more